Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    10/05/2024, 07:27

General

  • Target

    a0be7c5ea79ccd7e1f3735b89dcb27a0_NeikiAnalytics.exe

  • Size

    134KB

  • MD5

    a0be7c5ea79ccd7e1f3735b89dcb27a0

  • SHA1

    e552cf500f996de529ac9a7a73824fa7709fa583

  • SHA256

    6a42c385897dfba48eed3eebdc1c0a3595290ea344b02c12ebcdfb324e6f523c

  • SHA512

    0103b749f2f88fbcb7747bfafc647fd3a0bfe58c5177b2e625b8995a67c27e737948959dfff95e3ac383bbc06110f042b103d1460b375bf8966b15244f9bccdf

  • SSDEEP

    1536:67Zf/FAlsM1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCj:+nymCAIuZAIuYSMjoqtMHfhfC

Score
9/10

Malware Config

Signatures

  • Renames multiple (3433) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a0be7c5ea79ccd7e1f3735b89dcb27a0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\a0be7c5ea79ccd7e1f3735b89dcb27a0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2064

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2721934792-624042501-2768869379-1000\desktop.ini.tmp

          Filesize

          135KB

          MD5

          86d5a188f5f08f96247db14b9a096d90

          SHA1

          515816855f0618908da0397666941187a7f0485a

          SHA256

          eba82f44f6e40b29b280771c7c7a63ee064b5710c05183aaff97634cb581c39f

          SHA512

          684285a58a32cfa3683f5dc0c4bdce8af72076393eed954554c19cbdb275ef7430847cbafc992cc05ec1b407a14ad9ffbd1b490c5d0cc4554c02960d8cb06c9d

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          143KB

          MD5

          21afb3e15422bb4db5569b009a6c6ea7

          SHA1

          2b0cba4fa78f0a6e432f6b2bb291a461d894c98d

          SHA256

          678578b1062e5292628a8c7f873e1e5643bf7e939f120c43805656f311ab52af

          SHA512

          82b542e6f2b921d4a64ef18ee5baa6c2b4bbe35d1d7156d207d01a5341084fdabd1284e3c96e89788f65325a185ab4b6fffde31576371bb2f4103cc77e17af82

        • memory/2064-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/2064-642-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB