Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    11/05/2024, 05:52

General

  • Target

    8d0b0eebb75fa2339d5870bcafe3c660_NeikiAnalytics.exe

  • Size

    99KB

  • MD5

    8d0b0eebb75fa2339d5870bcafe3c660

  • SHA1

    77bebe68652de9f91f418a687b71e35f94ffdd5c

  • SHA256

    337844a68d5408e7f1068f991f4ec9f5089626ade37d96b76442bfa7198ba470

  • SHA512

    9da2514f49747a4e3bc80dc458b0b24eee8aa1adef53baf9280bf93c0ce463f9dd08b0e56174ce19f283473345d9b02369da6b071db16e7f5cf9cc544de4a073

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hf5S5:hfAIuZAIuYSMjoqtMHfhf5S5

Score
9/10

Malware Config

Signatures

  • Renames multiple (3450) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d0b0eebb75fa2339d5870bcafe3c660_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\8d0b0eebb75fa2339d5870bcafe3c660_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2100

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3452737119-3959686427-228443150-1000\desktop.ini.tmp

    Filesize

    99KB

    MD5

    8525dacc8bf7d71569581a8f0621f7b6

    SHA1

    66f06e53aa9b6ac700cc798c56f13e907e817f5d

    SHA256

    c555036a47651be91e01e4eaae24261ef4e320aee8008e7f6a204d1cbc898245

    SHA512

    c4482c94dbeec865c4af6c8f86123f76b55a523eadb8ba3ded0e737cbe11c9390f695e901cee315d56e9210f37a30df988441581edd1bb328ebe7d3acadd1f2f

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    108KB

    MD5

    d4edbda7ac826839593eadeb2b7f32a1

    SHA1

    f6638cc69871a283f59edbd961cff1da45a7debd

    SHA256

    3a0f3e858690bf0956a408292226f1b52b51d062774bfdf6225dd4895ebc3231

    SHA512

    1b0397fe4ee0bccc102db7887c4dfb23c41eaf743a39fd8e25821180b80230fae3337ebc871f07b5d092c7f54c7986b8612ddc67d5d1a5075d98f320e57f2860

  • memory/2100-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2100-76-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB