Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    24/06/2024, 12:27

General

  • Target

    720442f709d6f05939c6054e51f657a63f6d86b59d8bc8f2474957b9ac1d7e28_NeikiAnalytics.exe

  • Size

    71KB

  • MD5

    66fceea28f5ae1b00cc10ddc6166ac60

  • SHA1

    9d7825e6842bc99cbf9ec96c577b75f4511770cc

  • SHA256

    720442f709d6f05939c6054e51f657a63f6d86b59d8bc8f2474957b9ac1d7e28

  • SHA512

    2436ad97eced9a9e74bae4fcb2f1fd86f670b6d2e75222a158351e729d9ab9f75cca2576f787d49e35f48b1976cf66ac59e65bdfc80ce96c4d838cea6c127f2c

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8IZN:fnyiQSo7ZN

Score
9/10

Malware Config

Signatures

  • Renames multiple (3784) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\720442f709d6f05939c6054e51f657a63f6d86b59d8bc8f2474957b9ac1d7e28_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\720442f709d6f05939c6054e51f657a63f6d86b59d8bc8f2474957b9ac1d7e28_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:3044

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2737914667-933161113-3798636211-1000\desktop.ini.tmp

    Filesize

    71KB

    MD5

    50944f831f9fe5a779718fb19c22faf9

    SHA1

    2d61d762646e71f8c9295bfe455d5f70ff49709a

    SHA256

    b0bdbe7f112a7f0e4ec9fa4d49adb710a0fcad6c30a9701a3881cfdf995eb437

    SHA512

    a209d083b33a413ade6f95fd266cb97f94c2bf2aacbaaf3ad3704052e997fdbc73d2692986b890884d391d0da5c38154e19516b38cd3275be28df5b09db6eb65

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    80KB

    MD5

    a9dc90e88bcbb3982da6a18d684c0e9e

    SHA1

    f76bb4f28c4ea89ec0e5afe3df1cd80f18950af9

    SHA256

    d635cdcd40764eaaa15092b88a0baa06b700311fec4b2aa54abae1be8b8b80ac

    SHA512

    b402802a6cbb7d5497cfc4d5ce026cac70733c65c0ed94a0d75bdf97e92c61c6dea43f74605e1a59a3cb6ee370ce2c2a38409619f1e977c4516ea30ae80654c1

  • memory/3044-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3044-666-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB