Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/06/2024, 04:51

General

  • Target

    863d145abc27e7a006ba1358b68c87366c8b571bb7ad489446c050d6e93d3fef_NeikiAnalytics.exe

  • Size

    68KB

  • MD5

    0efef0d68bf54740873e19ac132e8300

  • SHA1

    feeec8c53613c6ab52818a0d30cea4c3a0470dcc

  • SHA256

    863d145abc27e7a006ba1358b68c87366c8b571bb7ad489446c050d6e93d3fef

  • SHA512

    b891367f31996d2dc895e724a8ed21e877dda3e96024af9b209dd54fdbdefa012ea55b90467444e11e5b23fadb5f2131f345ca96ad505da86f63e42d3aafc026

  • SSDEEP

    768:/7BlpQpARFbhIYJIJDYJIJPfFpsJcFfFpsJcmnGUNGU4EXBwzEXBwnR5hrxR5hrs:/7ZQpApze+eJfFpsJOfFpsJeFrxFrs

Score
9/10

Malware Config

Signatures

  • Renames multiple (5193) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\863d145abc27e7a006ba1358b68c87366c8b571bb7ad489446c050d6e93d3fef_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\863d145abc27e7a006ba1358b68c87366c8b571bb7ad489446c050d6e93d3fef_NeikiAnalytics.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:4680
    • C:\Windows\SysWOW64\Zombie.exe
      "C:\Windows\system32\Zombie.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      PID:1932

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2447855248-390457009-3660902674-1000\desktop.ini.exe

    Filesize

    68KB

    MD5

    05abaa8199e296f78bec62f425d4d1ee

    SHA1

    d15be185030a58f3bd03c30199f875088a120a20

    SHA256

    c9bbf44e72c0a6adf80300be257446510a4b5578dada45df6b29641bb65f7a19

    SHA512

    944d0dd778c832d9793f9ac59fb316fb44ec546b1fbc7da457ce490856a877cd79e33ab337a4d28a738257ca469e0ac7b5560eca0ea77b31f2245275c7dc7ba0

  • C:\Windows\SysWOW64\Zombie.exe

    Filesize

    68KB

    MD5

    f9c9886e33fc26d661b3127d7697ae5e

    SHA1

    8b68fa227501fa70b9fac83d1bfe5805cebd764e

    SHA256

    dbd9af5d92412f9c1a1ade58a584e908dd4180ddaedb2e28a283219cf2b27274

    SHA512

    61b064190785354a4e8dea2706069020d986c782320f009ecb7d2ac3671354ac61e21d5e1e3bc831adf2a02db735a3cf23b6498eb9eb6478ad0942edb7f54228

  • memory/4680-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4680-17-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB