Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    29/06/2024, 13:07

General

  • Target

    acb5085fcd03f6a3b9dcdba3a668de2071e177fe1ff85dfec004848d1d93ce60_NeikiAnalytics.exe

  • Size

    96KB

  • MD5

    375fd6e2c9c1a89e402ff1548601edb0

  • SHA1

    fccf538e3d8e754dad3c84b6e9aae9fd78a2209e

  • SHA256

    acb5085fcd03f6a3b9dcdba3a668de2071e177fe1ff85dfec004848d1d93ce60

  • SHA512

    efcef26684c5bf9d1234b1220e71dd723b152ecceb5c89815716793b3f2a76d9c3a8b328606d708d2cae22ee8094b08a77c09aee2d9e0b8b6a486814f568126f

  • SSDEEP

    3072:9QWpze+eO888888888888888888888888888888888888888888888888888888v:Lpe+ekeq19

Score
9/10

Malware Config

Signatures

  • Renames multiple (3454) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\acb5085fcd03f6a3b9dcdba3a668de2071e177fe1ff85dfec004848d1d93ce60_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\acb5085fcd03f6a3b9dcdba3a668de2071e177fe1ff85dfec004848d1d93ce60_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2740

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3691908287-3775019229-3534252667-1000\desktop.ini.tmp

    Filesize

    97KB

    MD5

    905f267cbf8f9fa1b8199780ec82c2fe

    SHA1

    e2f3fb99ad86c4dc85670a71a6622674eb4032d8

    SHA256

    5f6d74054ed1c20789c5ebd3be0863a1c53def012b7f4c8f36201ce4a4444c62

    SHA512

    c90974eb838e86b606ac21093707ba9325efb84071a80f4730ea65a12179046b46d24c21044eaf53cdde59a294118aaa1a863e228022edd83f3c442f610319c9

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    105KB

    MD5

    084ae041956cc11326379ae830443415

    SHA1

    9a42683057d78739a32b10b51d53a3d035c39cbb

    SHA256

    4ec92399c1cadc17813c70c5f51e0cc7491ef60cd78db68bbe35a00f14773ac2

    SHA512

    cef4361f2d35f567b7366796aa73f9603b939ddb6ac111049962c3a0a572bee138caba9dbca41c430549317cd0601b145171278b3d62e4de4ba0cfb00c3f076e

  • memory/2740-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2740-522-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB