Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    11-05-2024 05:04

General

  • Target

    8402c2ac275c6736d632e0a8d7aac900_NeikiAnalytics.exe

  • Size

    161KB

  • MD5

    8402c2ac275c6736d632e0a8d7aac900

  • SHA1

    90fc37b8b7f21f86a5d354d37e6f62990f825d26

  • SHA256

    6e2ff427f999e9657fd94a0b49e5ffe0db258409f9de9e91ce9984c54902ec53

  • SHA512

    d5e35f0b4e9a87d9aa357260b776dc6a5b69036bf98d783051787022fbc42d84ccacc18352aa17a0c56f7d96a1ad94e6bba058c42264a224bdb53555b5d16b96

  • SSDEEP

    1536:CTWn1++PJHJXA/OsIZfzc3/Q1pkMJ+ZGtK1+ZGtKQNMdTajOtGtU1wAIuZAIuJBH:KQSo1EZGtKgZGtK/PgtU1wAIuZAIu3

Score
9/10

Malware Config

Signatures

  • Renames multiple (3276) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8402c2ac275c6736d632e0a8d7aac900_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\8402c2ac275c6736d632e0a8d7aac900_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1728

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1298544033-3225604241-2703760938-1000\desktop.ini.tmp

    Filesize

    162KB

    MD5

    04aead1b92fc170c0fcbdbe87b6676c6

    SHA1

    a51143c3a82dc2a6c3322f94316584d577822221

    SHA256

    b739d65bd98d0de6fe85da09fa14781f3d1242759470b148285f379311061a0d

    SHA512

    95e7913597c5521f8b7f2c46018ad7b01a7f9527f1cd79838cfcff5f9b5105a47510c85732b0b9e75b07b592828a99a0742e9cd4089b2c95dd037f114c3eb779

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    171KB

    MD5

    3ca868d6218aed9f4e0613753a90d0a6

    SHA1

    2b20b8b977abc096e1f22def0e9e22d192324edb

    SHA256

    cb7f74e2df52c2fb8138519b2355ce637a0700b88a1a95e99375548ac763ecc1

    SHA512

    b5af578efba0c00d824e3e5f84e4e279ce7f4c14d680aedcf4c2167c3ec3550fe52fd3c5a2e8e57e852a78dee10c79e554cb20f97fab3c319bdd6778da52e258

  • memory/1728-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1728-76-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB