Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    27/06/2024, 08:16

General

  • Target

    6ad3281d40cd820eeb87908f433cc51d7b35e107d558fba695175365c28b7d8a_NeikiAnalytics.exe

  • Size

    97KB

  • MD5

    18bee2084e59fed8869a772644dedf90

  • SHA1

    3d7bcd8599c7f7931d37117b2d203a44cb53c3df

  • SHA256

    6ad3281d40cd820eeb87908f433cc51d7b35e107d558fba695175365c28b7d8a

  • SHA512

    f3317d17e01690fc033d9fff1b101aa37b97c3cea02eb9af13b2ce4426aafdfa2cc0749515dd87cf1642d70cc6ac7d422260ca9e3228679495d6e5c4aa14f2b6

  • SSDEEP

    3072:9QWpze+eO888888888888888888888888888888888888888888888888888888o:Lpe+ekeq1+

Score
9/10

Malware Config

Signatures

  • Renames multiple (3478) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6ad3281d40cd820eeb87908f433cc51d7b35e107d558fba695175365c28b7d8a_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\6ad3281d40cd820eeb87908f433cc51d7b35e107d558fba695175365c28b7d8a_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2440

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3691908287-3775019229-3534252667-1000\desktop.ini.tmp

    Filesize

    98KB

    MD5

    aa72162c7108ae0342144de3414b0c9a

    SHA1

    1a8c72efa5d0e7046b85d47d4b5a573629b7a205

    SHA256

    abcf5de337261c77278a7203643edb98b9df5c76f920d75eb768c18d5fd9b271

    SHA512

    f6b69035c3c5cc2f9e2f68481b52d9af24aa85f70c89f164d623f5dabf31f1a1a6decca9fac0b597cca8c868a244df46415cb698b46cc71132224642b87d0c9c

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    106KB

    MD5

    b2ebc74bf18abdd5b0cb3ac256b6c9cb

    SHA1

    190f193674d713486c0eae06a47d531e2bfde77c

    SHA256

    c66a96581149d4e0769be05182cfbb9ceb764bc0576e7d16eadaf5fe4c0c5c50

    SHA512

    69b1a1e1eb9a20cb78c6412d1cb8a8ee44f9a1daed906701002db17d5dc43c3969fcd44a674c9ee0109b13dabc61183010a6a6bce5b59501e255e0baf59c3c80

  • memory/2440-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2440-652-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB