Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    28/06/2024, 20:55

General

  • Target

    17261e0c293e1124149e01016e18e88ec2a58037b4a488e9e1f299e2d89633b5_NeikiAnalytics.exe

  • Size

    38KB

  • MD5

    91504388ed2c276a4cd68c3ec7b00ba0

  • SHA1

    08fd1e6830a13f0d08cf707bc05f88390825736a

  • SHA256

    17261e0c293e1124149e01016e18e88ec2a58037b4a488e9e1f299e2d89633b5

  • SHA512

    c1fadf738d2a534903828a766548c35950d86456d636adcf9c70c0886f4a021b8b60d3d0cd968f71adef5b2b5eb003d7ad59a65beceb07d248f18a0dfe5f9e52

  • SSDEEP

    384:GBt7Br5xjL9AgA71FbhvuNBN2TQ1nrSLmnsNw/NwW:W7BlpppARFbhknrSLmsNw/NwW

Score
9/10

Malware Config

Signatures

  • Renames multiple (4032) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\17261e0c293e1124149e01016e18e88ec2a58037b4a488e9e1f299e2d89633b5_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\17261e0c293e1124149e01016e18e88ec2a58037b4a488e9e1f299e2d89633b5_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:3032

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2721934792-624042501-2768869379-1000\desktop.ini.tmp

    Filesize

    38KB

    MD5

    ab2205b38f12bc15cde7652a1ae0b365

    SHA1

    8f63bb629b79489ac885ac983f8ac52e066626a5

    SHA256

    b8c928f7b06bc0129ed0a2f98b2ccad1e855bc53cebdad060e7a95e3c6f01475

    SHA512

    cabaacb7eadfa809b655c53d996038a75e835eaf6106d59a3e07b3d0aeaffd85bb3997c99c6db98f6f8ed1a3676508b0d61d6cb53337f4c6f6c27ba41b244846

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    47KB

    MD5

    fca34dbe4e410080d3813f74c2053fbd

    SHA1

    13bac77230e5c21e8394eec481d79489da4358ac

    SHA256

    e5eed6fc1bc984ffafdd4be05af03ac3fc93f9bf934532f1e887014ba17b381b

    SHA512

    a211fcae2e6648d1a30e2fbe456632344c13729a9ac49faf90c0c4a64cb93f9f34027345e9976a824559c094fc5dec98df13b718142c180bd2202e4052e4dc98