Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    29/06/2024, 21:52 UTC

General

  • Target

    032601ba4b164d62e1869183b8bfe5a716ae084af72ffe45b90eff748cc35b5e_NeikiAnalytics.exe

  • Size

    86KB

  • MD5

    7128224987fb2a7ffce031a33a937ef0

  • SHA1

    4ed420c8eefed4b7965e4926a7e14a97d576bf76

  • SHA256

    032601ba4b164d62e1869183b8bfe5a716ae084af72ffe45b90eff748cc35b5e

  • SHA512

    6a31ada6fcffb241ce801f9b1f06780f16a71164f557c135922cf38de8af41ba0eeb1c9ece70b9e8739237a96d66f06cd4bfde42d752a0712ab0fcb48320422f

  • SSDEEP

    1536:/7ZQpApze+eO888888888888888888888888888888888888888888888888888C:9QWpze+eO88888888888888888888887

Score
9/10

Malware Config

Signatures

  • Renames multiple (3502) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\032601ba4b164d62e1869183b8bfe5a716ae084af72ffe45b90eff748cc35b5e_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\032601ba4b164d62e1869183b8bfe5a716ae084af72ffe45b90eff748cc35b5e_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1752

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3627615824-4061627003-3019543961-1000\desktop.ini.tmp

    Filesize

    86KB

    MD5

    027b06c0ff83f5d51a3959c019dc89a8

    SHA1

    d3b154e5a7b19e125f649f2aaaa51d71dbe602af

    SHA256

    4b268f1ecc36dc5028bcf4fb9a6a374d48ac8a9ede7e64ad30fc72f25dcd3d3b

    SHA512

    696054180e87ebc5cbc4e8a00836fc64b4ee4b0487dc6a1cc98d12b41ecc3ae1056f284f3ec015d634fef63b218ee579416cbf1cda0c481b6791ab68180ae581

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    95KB

    MD5

    2bf093a7054f230fea0bf74a913e4206

    SHA1

    eaf172be224cb08a64690ff6e810f539fc554038

    SHA256

    90e2d155c886094118f8af8939b526065455f89cfcb6d9668030da3d674374f5

    SHA512

    23b614c0b98a6ee2a19cba3aaff77f9d28b1464d60c04dc0dc263ab0481a635043adfff828c7602ee59250377f20c734272e3501269e6170c695def6eea08357

  • memory/1752-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1752-652-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.