Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    10/06/2024, 14:02

General

  • Target

    18fec11e98818d07127b3b57b53944c0_NeikiAnalytics.exe

  • Size

    135KB

  • MD5

    18fec11e98818d07127b3b57b53944c0

  • SHA1

    51152cfa767a91fa713607cf4644ba3e63f3c43e

  • SHA256

    630c73dd82801009d075aa5733bf25009fe38a3aae8216b0b4ee349747c5aba6

  • SHA512

    aeace992fb68df0b32174b342671e465e33f11e9e34a1480ebd336af8e1a76a7737263b01081987714e9bd486953a598138b39e3c305bf0836f4f37deb6173e8

  • SSDEEP

    1536:V7Zf/FAlsM1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSC2:fnymCAIuZAIuYSMjoqtMHfhfagP

Score
9/10

Malware Config

Signatures

  • Renames multiple (3428) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\18fec11e98818d07127b3b57b53944c0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\18fec11e98818d07127b3b57b53944c0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1068

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3627615824-4061627003-3019543961-1000\desktop.ini.tmp

    Filesize

    135KB

    MD5

    2f2b846b9ca56bfd7bf3f71de1023ad2

    SHA1

    693ca6152d2721c50836f85e0d83267c370cfcf2

    SHA256

    346ab4f17521b89d6f14abe28db307e264968ab5c2869149d6b850a7e8a80c1f

    SHA512

    2f94b05450befc16561edc470b9426c3d24a45d5647fd719f3adbc5125aa56fad33ba196396d79c4ac4537140c9df945d8c085cf4f25e772aa7523a6cf670b14

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    144KB

    MD5

    6933d74b3d76ba9dbc9e7363c1cbf23a

    SHA1

    83ef2c19f515e7ed11ad9fe82f9eaee5ed721bbe

    SHA256

    9f095427c58cbd480df437492b13a1c313e70a31ef83b4fc9adc733b81cfca33

    SHA512

    fccfa494c7f5dbd266e68c4494fb069f73cb1edd2e5b4379b8e1f7af22ab3157c821a243973d0ac618461613f1e09ecfaf7043d0c1afeef81607e69f762ae75d

  • memory/1068-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1068-640-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB