Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    130s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05/06/2024, 09:42

General

  • Target

    4eb0f755f3786042149297232fc72510_NeikiAnalytics.exe

  • Size

    257KB

  • MD5

    4eb0f755f3786042149297232fc72510

  • SHA1

    2bd6ef8cee238107a14e22008488cfbd5487c9db

  • SHA256

    a10a47ee70804e2668210d93d33ddc345f089139a871c122536de976227ed595

  • SHA512

    ea3ef5cb781b733a37c279ff7f9d779976ad08425793c6a2a4c63bbeecf98cc6f6f9b2ecf3610d80c2170c9ffb62c61425bf5ecc9c1588b17a9dde08a9b297be

  • SSDEEP

    3072:fnymCAIuZAIuYSMjoqtMHfhflixiMfAIuZAIuYSMjoqtMHfhflixiz:KmCAIuZAIuDMVtM/mfAIuZAIuDMVtM/J

Score
9/10

Malware Config

Signatures

  • Renames multiple (2708) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4eb0f755f3786042149297232fc72510_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\4eb0f755f3786042149297232fc72510_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2612

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3452737119-3959686427-228443150-1000\desktop.ini.tmp

    Filesize

    257KB

    MD5

    5c830a64988132e91a4225efb4965662

    SHA1

    4d6855e2c1285a021aea44e60df50558d1bd6e09

    SHA256

    751bcbeb837f7f58c68efebc86b3ba69ed3858dd9a6d3a25634a757f6b711dad

    SHA512

    f6ff84f21122dd2f4a25132d4206ada45e820a66ba2f7f230e2da04dc0b29a0883f73077e3d8d0fcf62dd5dffc7ccaa70078f55a50c4489debf50b66eb0cdc2a

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    266KB

    MD5

    7b96614462eb658c53b7fe5fe0a2377f

    SHA1

    e7f9b4f4a1c7c52084685a192a85b03650989f70

    SHA256

    6fdd068f3a39770b912374e63744aac4facc48c43da323bd4012a77014293f4c

    SHA512

    85cf2ddec7999c3a8cb95014f8a4200c316f739411baa7b8fa009405c536156108f467f608587649804b220a1c9d3b1b64e13dd403938eb06a924bc29b13a081

  • memory/2612-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2612-500-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB