Analysis

  • max time kernel
    124s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09/05/2024, 22:46

General

  • Target

    14ff802736bdc97ab0e637e39f0f3740_NeikiAnalytics.exe

  • Size

    106KB

  • MD5

    14ff802736bdc97ab0e637e39f0f3740

  • SHA1

    f46034b6c22e359d41a408b45163adaf9bf4f070

  • SHA256

    0c6c5d4ed212a5354796c66458cbca0911c19227b9420a481232e4dcecd59f42

  • SHA512

    38566a84fcc309b4d8b2a6ee3deaaee5e012b09772ec3fe58d5b00852daf2ce130be6ca9c01f860ea3b479b55509b7f245ac074d68c9746d59ccd0a9abb1691b

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hf1:hfAIuZAIuYSMjoqtMHfhf1

Score
9/10

Malware Config

Signatures

  • Renames multiple (2980) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\14ff802736bdc97ab0e637e39f0f3740_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\14ff802736bdc97ab0e637e39f0f3740_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2276

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3452737119-3959686427-228443150-1000\desktop.ini.tmp

    Filesize

    106KB

    MD5

    067d7714e87e18bda2a814029fbf9a3b

    SHA1

    f2b51c25e062505fe63d4686f5a2fe5ae905459c

    SHA256

    3b0a7a700659e69d3074d522701b57d29c854947ef46b4f6de13e81f339f10db

    SHA512

    25c081562381ea5d465ba7d881b7d1656d094f5c06ebaa8deaf66609d4049edf4f492619f6f2e91a318cb71e4f846af70b4ea8b6d12b5426f0054a231b3f150d

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    115KB

    MD5

    dc3e9f82827480b35c1ecf62b3001079

    SHA1

    39f8ebff51f9c50fe035d887909a2d343c5bf2a4

    SHA256

    0fee82c30f02b636176dcd13c0ca3821aa91cea3bc98e3dff6fc753d980b6986

    SHA512

    b33d72eb7871cc148779535a45c0948ecfb80f75010963d09466805e86925c79c53847e14e05b16545e9050035fded7b5e60073f22bd24d558990ffd0b37fcec

  • memory/2276-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2276-76-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB