Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    03/06/2024, 00:32

General

  • Target

    8c2d03a645c3e8a56a1e3851f867a2e0_NeikiAnalytics.exe

  • Size

    68KB

  • MD5

    8c2d03a645c3e8a56a1e3851f867a2e0

  • SHA1

    6f31344902006c98ff309fbd5c4191a04ae6edc0

  • SHA256

    a5c1c2d98d79490fa582c3fec2dabc78ebf22e7965859597aa8d001247b11a97

  • SHA512

    06e2ef4aa958e749c98692973f36f59e884e2b17d67723d3c09cb6c86c2141856da44e0f38c50906b16561bc05cb206d00869714a3e0b40766ddb68b3f6fa5c5

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8B8/8r:+nyiQSoFkr

Score
9/10

Malware Config

Signatures

  • Renames multiple (3447) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8c2d03a645c3e8a56a1e3851f867a2e0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\8c2d03a645c3e8a56a1e3851f867a2e0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2864

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1298544033-3225604241-2703760938-1000\desktop.ini.tmp

    Filesize

    69KB

    MD5

    3a98f7f114d47e01a1fd507776f42550

    SHA1

    6ee6c4853bfbe1405a6e7646701446b778ee50d1

    SHA256

    f6ea02e41d49e117f8a15a1b04edc0e01cf3d8c5305c7e881f96d786b62936f3

    SHA512

    62c63b2c59ef638fc7e0442c26c06969b4b2b05c4a791f7dd44b288f053659311f40f338aee6d522b0e0adc66b7e3a0915d0351a4bb7c06f2a1a68b8d16a7e1f

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    78KB

    MD5

    12408fcf505247bf9cfe1fb26bf7d46e

    SHA1

    a6e3708586f2b2723485cd2a006c43f1d0cd7295

    SHA256

    d448f789be9f0d9f5e6980e2749f41ce6b3e15ecba3d617786f1299cad249a52

    SHA512

    a91921457afd14f9055f54b62281b3d169bf8ba5a90a6dea09190b70413a14c6ddcbb8ff026927d71bc6a61068eec862b3ea9a0fe816577cb03b7e15143f1af7

  • memory/2864-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2864-388-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB