Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09/05/2024, 12:21

General

  • Target

    3636963d46445f023ca24c6bec628120_NeikiAnalytics.exe

  • Size

    312KB

  • MD5

    3636963d46445f023ca24c6bec628120

  • SHA1

    f9c7c57c70dc6dc0323d1f3a519696ffcf394644

  • SHA256

    3eec9f7debcddd4da5c5cc3543bc62cbdd055a13874605e8fcaf4e773e8ac269

  • SHA512

    b8a107556f5d99ebb41b2b895f3ec549ffd346852c083b34e1ae09b527cf3af8bd95b1a43f01d2abc2c51e03e259a8f49aaa7484133a322eb9d91d3373b54c1e

  • SSDEEP

    6144:JiQSo1EZGtKgZGtK/CAIuZAIuBQSo1EZGtKgZGtK/CAIuZAIu1:AQtyZGtKgZGtK/CAIuZAIuBQtyZGtKgQ

Score
9/10

Malware Config

Signatures

  • Renames multiple (2802) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3636963d46445f023ca24c6bec628120_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\3636963d46445f023ca24c6bec628120_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:348

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2297530677-1229052932-2803917579-1000\desktop.ini.tmp

    Filesize

    313KB

    MD5

    6a9627395af2e9351ab4b832b5eb59b0

    SHA1

    7c3f295cf5fdebae5f8d3d945da3b5b9bb783c45

    SHA256

    7550a2d73f0029eece8ec84620353855154968b59d8406a53ba30f2aa12febfd

    SHA512

    f2294004e5ee0a38471ce2a5fb4111fd481ff8e84bbbe34a8aa368ef1aa1b24121e9fdeef9819c38b08e5f38fbd2dc98d8d94fe4e12c7127fe60a00b6f80c834

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    322KB

    MD5

    74eb5ce0932802a039242766c39a1af7

    SHA1

    fc1ce9aaaa5c0ac95393cebea506b600b4dcab95

    SHA256

    5d7443311d028b4ed41fce57168460376b17b3fb602c6acf5b90417813ba6c88

    SHA512

    89323eb3be5987912e80d8b2294f363ea2514a9250f4236d8cc612abda5d1fa7fea44f2b8e61dbb9b144986940513b137616a7e401f7d0c9b9525ff0b7edf529

  • memory/348-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/348-396-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB