Analysis

  • max time kernel
    148s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    09/05/2024, 16:47

General

  • Target

    95d036fb68d5441fedbc07cb7a158d80_NeikiAnalytics.exe

  • Size

    108KB

  • MD5

    95d036fb68d5441fedbc07cb7a158d80

  • SHA1

    44a54f83733cd253ca420da5f00b9bc3951e1507

  • SHA256

    006d7e4e4104a05f8ac150153dc28e7aa94d4b6bf596aca475471d5e62748b91

  • SHA512

    c45c45c361b69c99f07b596d141aab91529218d55c2caba77cc87a0656bdc62d756684ad1d6f50c80db7a8fc1b762186ad0ff6f34680b14f32d57ffcaf1e4f2a

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hfOh:hfAIuZAIuYSMjoqtMHfhfe

Score
9/10

Malware Config

Signatures

  • Renames multiple (3445) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\95d036fb68d5441fedbc07cb7a158d80_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\95d036fb68d5441fedbc07cb7a158d80_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2364

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2721934792-624042501-2768869379-1000\desktop.ini.tmp

    Filesize

    108KB

    MD5

    3da1f94137616a7e3019e0f02dc12ada

    SHA1

    6b300d1436c1d394812971b2df55e778d8704b62

    SHA256

    6ca7bceb437086d757d8e2793504a7600cba0b52987492c3bc769fc566a0750a

    SHA512

    ce6283f07dd8307167090a0d0d510bb76152a9d0c208eb07e616e40fa5ecb4f3243887eb48d738b9874fba949f41a2faf5e965bbcba596dd88c7c3909ccdbb96

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    117KB

    MD5

    3d0c7985646884b2c358f57c364904d3

    SHA1

    8592c5b6c6443e24de57d6a849c08e5ff2005f47

    SHA256

    b34aa3d6b59da18156e466bac70d5de5446477f8c8cabf2948cb5c8524fe8ef6

    SHA512

    d35c3b036adab803d43eac0f69031fe700e16fbe3a692cc1f861b1cb37b28e75860d84e62f05b8a35d9e109a98eeabf1619206f90fb89847927b72a8d9b38556

  • memory/2364-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2364-76-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB