Analysis

  • max time kernel
    142s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    10/05/2024, 04:57

General

  • Target

    75c461c8317f6f078ebb9bc5aa4eeab0_NeikiAnalytics.exe

  • Size

    101KB

  • MD5

    75c461c8317f6f078ebb9bc5aa4eeab0

  • SHA1

    3e8b7dd5dfed764e2a82ae6a906b7f6c2514cf7b

  • SHA256

    73c60b2153ef7a34ca7746554dc4654dd5b034bc79da5d442f34dba768ef7918

  • SHA512

    03c639a12a15530b5a10ea8c3257e13566457ceb0c13eeb0a48b90c52906dd28ec20515edcdab5dc73c40bfb608651f3542f5aba49ca4d5d6a110841af581abf

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hfp:hfAIuZAIuYSMjoqtMHfhfp

Score
9/10

Malware Config

Signatures

  • Renames multiple (3442) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\75c461c8317f6f078ebb9bc5aa4eeab0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\75c461c8317f6f078ebb9bc5aa4eeab0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2352

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3627615824-4061627003-3019543961-1000\desktop.ini.tmp

    Filesize

    102KB

    MD5

    722a8f35cd93230a7db861973ab575ce

    SHA1

    0052d7beadfe9f826322d78727abed4ef17d370d

    SHA256

    1f15817b6b05b5d67a5bef343ed20f4cf497dc14a25ceb75137bbdb2c302e16a

    SHA512

    5acee67c0bd358369cd128a8f17b71427eb376900b61a1a04592197c700683ff0bf4c568179060e32f43caff786afce10e7b96d63ee7c7613d1c981a76ff170d

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    111KB

    MD5

    e462cb404813e2e023e5d4bc82b153ea

    SHA1

    c815a1d1603211b1c930dd831a893c5b5b7affdb

    SHA256

    d2e6bc8613a5e07d09aef617437b2b6e52a02a5c45f88b138d99eb161be31e60

    SHA512

    85cf069c541eae669825078dd2718bd6eccf2936c23fbb08bfc4948ae181fd8e06056f60b893a028f6000bce8c47ee694c0dfd280891a9379f1f7cd0aea1a9be

  • memory/2352-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2352-76-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB