Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    10-05-2024 00:40

General

  • Target

    3036dbb3c02dcc79cff5e487abfbc2a0_NeikiAnalytics.exe

  • Size

    104KB

  • MD5

    3036dbb3c02dcc79cff5e487abfbc2a0

  • SHA1

    553af2489252f1b6905946418cfcb3b08a1b5204

  • SHA256

    00bcf482903672bb7896468b50b34ddce26254a684e7be575bd11561c23ce8ea

  • SHA512

    7327756df68ae6a0785e23850c80b650aeb06f8094bef533ed4082aad29d238342d6fae9f34db73f7331e3aec58474e0906e91a62c6810dde22e1808a1934c28

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hf/m:hfAIuZAIuYSMjoqtMHfhfu

Score
9/10

Malware Config

Signatures

  • Renames multiple (3180) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3036dbb3c02dcc79cff5e487abfbc2a0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\3036dbb3c02dcc79cff5e487abfbc2a0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1216

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-268080393-3149932598-1824759070-1000\desktop.ini.tmp

    Filesize

    104KB

    MD5

    163b94948705bda2e00bbc329f2f5a33

    SHA1

    426ed64d7cd1901491790c975747b40675898e01

    SHA256

    6fb6b92d08c26f35c3d34fd9d9931aaa149031dcb4565d3e6b8b64b6fd5a99dd

    SHA512

    ca0dca7fd50f57553f4b5f66306502b0d4b6d6bfe965df8335acae18b62855c6755d5cb12809fe267e32e66cff3101bcf328eaf44007031315513a490b6936e0

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    113KB

    MD5

    64b57640711a1290c94e44241b83a72f

    SHA1

    67fa8fb00abe2e6a4000f86d9c0c25803aa9b1a4

    SHA256

    57daf160d92e07d4619db905f093e27960b28ac4101199d1896970b68347e3a7

    SHA512

    dfb2552368ab5bdfa6da5365d0fcc5176312833071541c7b9686f9233a9aad412c7f71aacbc094c27bd9a6f61979e8aac47d19585a584e4b5e69b371ee53b848

  • memory/1216-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1216-74-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB