Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/06/2024, 00:32

General

  • Target

    8c2d03a645c3e8a56a1e3851f867a2e0_NeikiAnalytics.exe

  • Size

    68KB

  • MD5

    8c2d03a645c3e8a56a1e3851f867a2e0

  • SHA1

    6f31344902006c98ff309fbd5c4191a04ae6edc0

  • SHA256

    a5c1c2d98d79490fa582c3fec2dabc78ebf22e7965859597aa8d001247b11a97

  • SHA512

    06e2ef4aa958e749c98692973f36f59e884e2b17d67723d3c09cb6c86c2141856da44e0f38c50906b16561bc05cb206d00869714a3e0b40766ddb68b3f6fa5c5

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8B8/8r:+nyiQSoFkr

Score
9/10

Malware Config

Signatures

  • Renames multiple (5055) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8c2d03a645c3e8a56a1e3851f867a2e0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\8c2d03a645c3e8a56a1e3851f867a2e0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2664

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3558294865-3673844354-2255444939-1000\desktop.ini.tmp

    Filesize

    69KB

    MD5

    dc7cfec433683a4a7216289afbbb1a7b

    SHA1

    f5afcbd4b1955484596f3463351dbc5ebc9df0b6

    SHA256

    d8b164aca76ba893fe71c7fb47f9dc60de460ef35d2b2d406c0dab62e48ea08c

    SHA512

    f1f1b30c62dd6d8deb8dbd23c577290389f8454e23f0c18c14fa35d5d79b11f56dbcc5f7e881c1cf664d364d957cb3f9bf5fc1b8ed9f3f26d82162a95fe563f5

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    167KB

    MD5

    3b7a933e5f84e51704fade801890663f

    SHA1

    75e1efc623ae9100d76996e90b6384a2472e3b53

    SHA256

    64de2260ac610eab073905f71ed01161c11be394074bcedd4578d9ddf1d00834

    SHA512

    94cc7fc00ec4d426d41838fe2c6a30fcab122a784f14d59e10d31e7a43daf7ae6703c26a63c461f24c100ea118f8733ad2728104eaf4822d9b93957efb69db71

  • memory/2664-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2664-1852-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB