Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    01/07/2024, 10:31 UTC

General

  • Target

    4afe7325cdbbaf6071318a12e0246a3570df583a9e1ca8b2858fd93eb3e07378_NeikiAnalytics.exe

  • Size

    40KB

  • MD5

    fcf238eee47ad77e4941d50116b3f630

  • SHA1

    e0a20b73fd318d5ba43525a24305d2106def078b

  • SHA256

    4afe7325cdbbaf6071318a12e0246a3570df583a9e1ca8b2858fd93eb3e07378

  • SHA512

    3821775506bc088f62259fe7b6c5452682b4f7b1f9bcab28aa4038578ae8b9fd2f6f3a99400812060ec8781b07ae9b5fbc87a6b4ba50c5d41393d4e808a76c55

  • SSDEEP

    384:GBt7Br5xjL9AgA71FbhvuNBN2TQ1nrq9SkpaTLkpaTA:W7BlpppARFbhknr6A0AA

Score
9/10

Malware Config

Signatures

  • Renames multiple (3499) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4afe7325cdbbaf6071318a12e0246a3570df583a9e1ca8b2858fd93eb3e07378_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\4afe7325cdbbaf6071318a12e0246a3570df583a9e1ca8b2858fd93eb3e07378_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:292

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2297530677-1229052932-2803917579-1000\desktop.ini.tmp

    Filesize

    40KB

    MD5

    06ec75a652196fa92b4842718fa857e6

    SHA1

    db2ff2f6ddf74587a3b6c9e907676363d8a2dcf1

    SHA256

    31544976e80dba2ba3606d04ab56c4c85b1cf934b9070e6f625ad1a644dcd404

    SHA512

    0828874cb4448b5d4f0db820ff4f17983f6cb52f39502af4d8e35fa088fd5d3930d4d47ba2701ee792574fae2b7be0547a99582bf9d8b06f0208cd287a0bbb7f

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    49KB

    MD5

    ebfa45e7d386014d4caf20f360cf0e2a

    SHA1

    a7ce450f3a1a1b4d162604a58ccd6fd364ca3109

    SHA256

    1bbc5e6d9ffe0bf40f95fe15918344254463b88514531ae49d3763631b3f12d2

    SHA512

    d24e8307491b7e9c8d4c45bc8427c01e86fc356df69d7be880cb0aa47d91191015ee65aac36ddcf106ca190005641fb3a53d2f12b4595b4afd26b503fbfe51ac

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.