Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    11-05-2024 23:15

General

  • Target

    47c8bef60557ead021e1bcf6ec9fc870_NeikiAnalytics.exe

  • Size

    132KB

  • MD5

    47c8bef60557ead021e1bcf6ec9fc870

  • SHA1

    01055bdaba558acdd5efe99573d5fa156d73d035

  • SHA256

    d311d7ae5e42396752251a75f5bfa725652c1d94fedcb407e92e32758412a86a

  • SHA512

    cb5da390e8b8a04020ef3774e4ca8a59687ea3dbaf6f8aeb69c2e869da5c7d2fa89ec7999e188e1e9ebeba6465aca1a3d993731a01389dc7e67d7c7fc90b4c83

  • SSDEEP

    1536:67Zf/FAlsM1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCR:+nymCAIuZAIuYSMjoqtMHfhf5K

Score
9/10

Malware Config

Signatures

  • Renames multiple (3446) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\47c8bef60557ead021e1bcf6ec9fc870_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\47c8bef60557ead021e1bcf6ec9fc870_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:308

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3691908287-3775019229-3534252667-1000\desktop.ini.tmp

    Filesize

    132KB

    MD5

    77efbac66d8d479ba4d3bbe0cee88b1d

    SHA1

    8fc98a3e7529471810202fa17172c59527b13578

    SHA256

    e2f8865b99536abea6446c7ec31ae5aacd4e186af67c8eca87dd49a84701b701

    SHA512

    9e24d92111f029f120a160ebfdd29b043d583102ba670e6e4df7cc965fd131fbed4528ab22087d0bfafe6080b96323ac8f14f41798d4a155e4de0acff915f7d4

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    141KB

    MD5

    0d68d96dcd9167d99d89e65e18647800

    SHA1

    6aa87372f1f2d2815aefe96bf493590f8caf41ef

    SHA256

    29a7dc4f4358ce53402cdb7d5d30f3f36e9f19989b5f91e35dcc1b3b67ff49b2

    SHA512

    94070f383c9c97a27ba4a6e1ed6ed225540ec267164ee6ae9d989629d770e988b9a0d0b68566bece29a81bfd1b24fafdc4c25f46f2217e69786684bda6b27f1e

  • memory/308-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/308-642-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB