Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    20/06/2024, 01:13

General

  • Target

    221379d93385bb16507a23ba419f6e18109d74414a149bb79aba9fee78fdc7c5_NeikiAnalytics.exe

  • Size

    57KB

  • MD5

    3acbb54c33247f37a3643fd46c0f77b0

  • SHA1

    32ea73887f97612b06bff64fc5cf3865ece8c24e

  • SHA256

    221379d93385bb16507a23ba419f6e18109d74414a149bb79aba9fee78fdc7c5

  • SHA512

    62d25b93505ff9ac3f97009dfc3dfbde2a9809ac62824c01d47f8ddbd747ae74c1f91287711dff909f253869536a7d37f0bf4be354e69c2f6cbe48ab802e8844

  • SSDEEP

    768:W7BlpNLpARFbhblkYlkuvIYFR27K8WKnFIMK8WKnFIhEXBwzEXBwn:W7ZNLpApCZuvIY0KNKnF3KNKnF0

Score
9/10

Malware Config

Signatures

  • Renames multiple (957) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\221379d93385bb16507a23ba419f6e18109d74414a149bb79aba9fee78fdc7c5_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\221379d93385bb16507a23ba419f6e18109d74414a149bb79aba9fee78fdc7c5_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1200

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-39690363-730359138-1046745555-1000\desktop.ini.tmp

    Filesize

    58KB

    MD5

    b137c65c2f8e13ba89897e2750c83c01

    SHA1

    79ce6314ca1a63cb60800a259ac6c60fe141e6d3

    SHA256

    53e4188279473a4b45d9795ba828ae91214e5d3b7b3f594a0b6949e6dc07f960

    SHA512

    50e0253deed03c6fe2979d66cf6a52547389bbb18b6befb410cb5bc6d4749b3b9fcdcd7c9d763ffadbdc07be9191bb9b6be2099efca002f06248fb4ad07d836f

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    66KB

    MD5

    408858a5fafdb3b7b069f9edff239ef1

    SHA1

    f992aaa9537c1f44c272ef2f6f6f647c0fa89a4d

    SHA256

    1340dcc19eb67eda41bb3de27d1f564d6726f81f3c588e45194c06882d7bac21

    SHA512

    558a1b7da3e57c9f25e64b76133a209bad3558f151a7aac952cb096cdcf21a59dc2103a09f52cdf1b2d1658f277a1c457fdaa7a58a5e750cfd494a253c63cb9a