Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    01/07/2024, 06:36

General

  • Target

    3c92f8a29d694ce21db18df51f46b69cf8dd846fa839cc5cd00b057b050cb63e_NeikiAnalytics.exe

  • Size

    47KB

  • MD5

    f73f1d5ef26ed645ba88a11ed0f25a20

  • SHA1

    1c4496525c02034eff379f487545d40aae56c5ba

  • SHA256

    3c92f8a29d694ce21db18df51f46b69cf8dd846fa839cc5cd00b057b050cb63e

  • SHA512

    a174710cc34c096ab39044d3afa54d92b9f0ee91472c627ff94e3d3216304bac9c87d8e0811146ae9bc1e913f9331291e63ac67776fb205b37469a7a96237253

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJjtf8WUtf8WZCqCT:V7Zf/FAxTWoJJ2WjWZCqCT

Score
9/10

Malware Config

Signatures

  • Renames multiple (3701) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c92f8a29d694ce21db18df51f46b69cf8dd846fa839cc5cd00b057b050cb63e_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\3c92f8a29d694ce21db18df51f46b69cf8dd846fa839cc5cd00b057b050cb63e_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2908

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2721934792-624042501-2768869379-1000\desktop.ini.tmp

    Filesize

    48KB

    MD5

    07f5976a003844677ccef40951c99bf5

    SHA1

    b375dfa60b3d07b234e362209e240fdd63f76915

    SHA256

    1045b5e77d0888839f77411b999019ea1a3969c5e99317599a8a3ac8282f5c72

    SHA512

    3eb38d2ca83143efeefbb2697ae2b5201fcc2a1eef46b07184d3b9a99f87278bfe5038888db4ab0898a534e8fc5ba941f875c882b714745928099288ea8943f8

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    56KB

    MD5

    3e81b84aeceb8015bc322037d6f3034a

    SHA1

    ba102eac97e01e085b70d4e6d350e0e1f4f1059a

    SHA256

    0dcad68df1d3244dc7032f60c60d4dce47f443b0bbd2fbb20b744f7fe950222b

    SHA512

    ad4781dd366525abf3f8128100a63fefc2576a5f3fb7e6b72dd96953f4153d21d3e03c5561f5820c3b9b92edc91950249e474e32af39ed0aa5638cb6a1b3f183

  • memory/2908-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2908-648-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB