Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25/06/2024, 01:44

General

  • Target

    1e652fdf0576cad2fc3dea8cda23936978f64c2c746ce382b5cd8c4108eb7448_NeikiAnalytics.exe

  • Size

    96KB

  • MD5

    3dd136d349805c74be12b7e1b1a8b640

  • SHA1

    d4006aa13a0ba7eef13bb95fe6ba90ecae4d9c9d

  • SHA256

    1e652fdf0576cad2fc3dea8cda23936978f64c2c746ce382b5cd8c4108eb7448

  • SHA512

    2d9c84011a52c93f6baad8414fff82907bcff5249599be5726663e18953b6e27848f012ae6481514f09e3e5d2567eae7500fa3a4654ae7d880fa715d0ad8ef5e

  • SSDEEP

    3072:9QWpze+eO888888888888888888888888888888888888888888888888888888b:Lpe+ekeq1V

Score
9/10

Malware Config

Signatures

  • Renames multiple (3429) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1e652fdf0576cad2fc3dea8cda23936978f64c2c746ce382b5cd8c4108eb7448_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\1e652fdf0576cad2fc3dea8cda23936978f64c2c746ce382b5cd8c4108eb7448_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2248

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2297530677-1229052932-2803917579-1000\desktop.ini.tmp

    Filesize

    97KB

    MD5

    f65e1cfbc4ef6c4b020ebd93eef5cdc7

    SHA1

    30cdd64761c0b390e3d6bc53236d5b46d672e3b0

    SHA256

    e21f8383f308858a9d4bd20dcfe98ecfb7d0c35e8c6d4fe9ead9172df81249f1

    SHA512

    a21296c005c29cd7f7f5d4e3c1520a030e64218c006d0db188698e1a94f0d303abd808fe75a1872f610f64bcc52d8916a649074a3dfa778b18a60b394c381aed

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    105KB

    MD5

    c4ea4ea3013df5c9e3e9abbb10d24e78

    SHA1

    18d4aa510796c9836e61627ab7d13d54dd10aac4

    SHA256

    4d914749853096413b91ab4dba6304fda2b9aa05c060c054bd065ad5a1f4594d

    SHA512

    4237418c976edff6100c3aff7b2fe5c8f60e9985b7425df58c019bd23c2cd8f21744fd72ae6515a55d2fbd7aa4b793052b258b64755c1014961677c31e3b0f10

  • memory/2248-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB