Analysis

  • max time kernel
    150s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    10/05/2024, 10:29

General

  • Target

    c4623934a5dd04018e8b047fce82e300_NeikiAnalytics.exe

  • Size

    101KB

  • MD5

    c4623934a5dd04018e8b047fce82e300

  • SHA1

    cf84ce3efd3dd6abb3cfcb67bb7a5a18ff6fa4da

  • SHA256

    cfb158f9b34e630679bf6fe38b08cd6e038949cda29153813760336b83e570f5

  • SHA512

    df53b985a29ece685c0ff22effd8f77974a3a771f81da7b2bd8b20527d9b774017a3dfac0f5e5210d7dd2d0f0a4ac00d25a60c8f776953b80433d8130e170301

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hfKZY:hfAIuZAIuYSMjoqtMHfhfb5f

Score
9/10

Malware Config

Signatures

  • Renames multiple (3454) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c4623934a5dd04018e8b047fce82e300_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\c4623934a5dd04018e8b047fce82e300_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1760

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-481678230-3773327859-3495911762-1000\desktop.ini.tmp

    Filesize

    101KB

    MD5

    386702977ce795c8fd4be9c64d466228

    SHA1

    ca20196b86c811c393950dffd2d514938a16f66e

    SHA256

    cfd2c81ef7cc74e0df2b6ff367df90811b9675e6e4a7c11789976433c70ecaf5

    SHA512

    34058ca0a8ee1672dbcd93b2a02f60ae2fa9b5b603ff442b75ca220e0ccd5d238f298d58d3ce79702bf7704b8e8f939b9662b3f334a39a69d279be497957cc21

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    110KB

    MD5

    fc3cf9adc22d51a691d7573d2f509a2e

    SHA1

    9fd0b2973332984a61e7939a7d68d60731720ed6

    SHA256

    1b2c0a522d084d26cb204f34c4ff34e052603e0430001ebd2104a0a9e6cdf12a

    SHA512

    d402d2c882b4b2f694046cfaaee2aa64f588f6c7a0a116fd23d89f7a051e4b261510091bda1220de2fbc451cb9da4d3b82cd3c7d355e2516668aa2185c727093

  • memory/1760-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1760-74-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB