Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    07/06/2024, 22:37

General

  • Target

    738a26e2132dde35dac548f48d35c280_NeikiAnalytics.exe

  • Size

    131KB

  • MD5

    738a26e2132dde35dac548f48d35c280

  • SHA1

    0e1c56c971e05c0f6c41da3cf80d19e2968176b2

  • SHA256

    4e7d7aadfdec06b704810a6038d5e97f09c19fe29b83a07fcc8120ccd6c52365

  • SHA512

    0150bf307a188866169a6f3b477e820032ae3116f39048aba0399ef604a66bff4656e918dc34b94796c8dc87ca13ba050c5af064db9488ad7a7b6c3d102817ab

  • SSDEEP

    3072:fnyiQSot+opbmMS7BSFHQi8bLRCw/UnEllk+kffteA00afFk/cs2/n+Zlomxgr4/:KiQSofp+u

Score
9/10

Malware Config

Signatures

  • Renames multiple (690) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\738a26e2132dde35dac548f48d35c280_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\738a26e2132dde35dac548f48d35c280_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1556

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-330940541-141609230-1670313778-1000\desktop.ini.tmp

    Filesize

    132KB

    MD5

    1c96a8396264bfccd8461feafcd36856

    SHA1

    599c20605d55b732cb76dcad9107d55e4aa9f294

    SHA256

    6a6caf234a07e355f9427f7904528dda83de2dcfc7fe2c1455cb42504d3e496b

    SHA512

    6f28fa7385c4cd192a20898060e280809c8dbec31bec6ab0ec1d42ed88f8caeaf89040dab3fdd773d38f723a6c902805489405641980114c56917a64b5390175

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    141KB

    MD5

    99da6f403ed5348b5ba98e380ae2c201

    SHA1

    7080ed392b61bc62306611de335621b0a8dc7d8b

    SHA256

    337c04001084b8db3652ef0a2a9471bdd668426d6d50cf76349ad51a92fa3762

    SHA512

    efbf4cd29177c22db04a67f99e348f8c2aa040fb576cc1615914d8c4680526d7961d4ab02fa058e1475d82221cf6eb65fc2cd6a490e9d9b9eb00d2bd8c79975f

  • memory/1556-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1556-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB