Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/06/2024, 09:56

General

  • Target

    b6127ac6c5c7e1b71d152075bfe8d3d0_NeikiAnalytics.exe

  • Size

    89KB

  • MD5

    b6127ac6c5c7e1b71d152075bfe8d3d0

  • SHA1

    bd05e884fae0d6770899ceabe1092277b8ac911c

  • SHA256

    eafee3fd0dd98a9113a71807aa25e5468d3a15e012cb8a988c6d1fb2eb827a48

  • SHA512

    43f00f160b2fa9a6bbcf8a08b3c1b968fa333c113057d16d6e281e9684cb7839639e7394de2ed7828eb206ef09299734ce941173ff2f894d4896e02a850346bc

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8asUsTq5q9BVI2IA:fnyiQSohsUsWU9BK3A

Score
9/10

Malware Config

Signatures

  • Renames multiple (5202) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b6127ac6c5c7e1b71d152075bfe8d3d0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\b6127ac6c5c7e1b71d152075bfe8d3d0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1176

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4124900551-4068476067-3491212533-1000\desktop.ini.tmp

    Filesize

    90KB

    MD5

    91425411efab6de9df5a8639f026b93a

    SHA1

    5ff74f9a746a494940d948f89a9486a52970ce06

    SHA256

    307c9e9b0005291f746c27651b55279d7c2adeff8d6428ad309989a21587805f

    SHA512

    f5c2a66b515dc45389430ae66eefa8c62e788cf77fc469e7ac83ff0d52a7f405e267c0c88656605d40570643319de6e2f876674f140210df50d87cc4a92dbba2

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    188KB

    MD5

    e5e870c0c5196b43a193fcec172d7401

    SHA1

    b39dd0cc2e89b74784b308a102bac7af7d2d16b8

    SHA256

    9d6e517e3bda7cce971febc3a2471d1850aaf7f2d7cbe83ca3584860f254fd69

    SHA512

    06491dc0de41307b7a50557c426098eb903207363a74ed51f6acda7bb9d2456ca0f7db9c54c78c50bb8e9883c16d341b1918edc2d3e458d15804f6e6d428d762

  • memory/1176-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1176-1956-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB