Analysis

  • max time kernel
    151s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10/05/2024, 12:13

General

  • Target

    dce40ac3b6582f52efe5a8a872bdc0d0_NeikiAnalytics.exe

  • Size

    159KB

  • MD5

    dce40ac3b6582f52efe5a8a872bdc0d0

  • SHA1

    3692df3b5e2bb97a0e781db0ff053ca0cd1c3b57

  • SHA256

    9f9e216e87b6fed7dff18119dd7f58306f08d031e5301429f7e74f5d3730f29f

  • SHA512

    d56baa07f4d65b89728d7ef1137b65043a5335ef4f3d31a343ccbcfdb1ab11238103f975735abfc59c6bc5a49e9ff4678e14240612bad2f3d483f5cf35b59d20

  • SSDEEP

    1536:CTWn1++PJHJXA/OsIZfzc3/Q1pkMJ+ZGtK1+ZGtKQNMdTajOtGtU1wAIuZAIuJ4:KQSo1EZGtKgZGtK/PgtU1wAIuZAIuy

Score
9/10

Malware Config

Signatures

  • Renames multiple (335) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dce40ac3b6582f52efe5a8a872bdc0d0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\dce40ac3b6582f52efe5a8a872bdc0d0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1312

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-330940541-141609230-1670313778-1000\desktop.ini.tmp

          Filesize

          159KB

          MD5

          80cf2fc1f795927d99bf4bded2007d3f

          SHA1

          6d58dc1363b691ff575d8f4af75fe16cfcc16aad

          SHA256

          27458383e46db5541dd0adecbe787acd3d9298b75e76adae9632a905d03d03df

          SHA512

          b83d0fdf6b96cfb4ccf3146528823079ff7fc5c1147f2d72eebde9982c49979c725b81ed3d8299c01e88a78deeb23292ae8f3c9e37320c3f37d67dd73817bf97

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          168KB

          MD5

          09efe854fa0a2cfc430d0a00ed9217bc

          SHA1

          7cb4fbd07ab825dfe8b26ad0c12254a7ecf5ab43

          SHA256

          df98e70da96cbe5fcdabeb6de427dadcde6122678f70891a23798cbcacf1cde8

          SHA512

          d26e61fed6efa74b6a0c63687c87b49a28048ccc9189061497e923f46d42efd707461b04d41ce0d183386ed73b936d33a674a88d5768265928f0570533e88a25

        • memory/1312-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/1312-18-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB