Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    11-05-2024 06:33

General

  • Target

    93dc5f73d006528814568b1c67ec5db0_NeikiAnalytics.exe

  • Size

    100KB

  • MD5

    93dc5f73d006528814568b1c67ec5db0

  • SHA1

    13714c921e66a15fa58868bfaa31e528290dbfba

  • SHA256

    66a4245a7d86a810b14f7acdc99b5a5cbac77ed795ee82d74ea076d59311081d

  • SHA512

    6cd6e8b6e140823787175b2f6c2a76bc9d06547fa754dbf61ad164a0e92d6894cb9d7fe820a4b17d3b16fb52bf4490c648473af60dfd5b75de786f5238e9f26c

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hf5Sg:hfAIuZAIuYSMjoqtMHfhf5Sg

Score
9/10

Malware Config

Signatures

  • Renames multiple (3437) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\93dc5f73d006528814568b1c67ec5db0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\93dc5f73d006528814568b1c67ec5db0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1660

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2248906074-2862704502-246302768-1000\desktop.ini.tmp

    Filesize

    100KB

    MD5

    8aaaec536ed17409f8e64e6d52bf3e8c

    SHA1

    ed156c1186929302f08862ca777c77adf9c38080

    SHA256

    537f61ecf9afa3420c6aeeb64fb165dbf85b003c5b3bf573163f95af1ac7bd6f

    SHA512

    891d89023603e24e0ea64859206c760e703c0b2d13f8c5d463cef432f3c9cedec1c2e4e640c20fc48a9d2ed3f6bda2dcc218f96c514f6a4ac95c4af72d6ddf56

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    109KB

    MD5

    bb3f0f9d595dc1b4bdae00e2c4b8e415

    SHA1

    3ce8f5fcb3120a8c0b025abadbe2532055442390

    SHA256

    8dec568cb585737fd97426eb585a2060e15651a0dc8dfd2cac1dd8f9f2ce7c8e

    SHA512

    4a2f6dab9f6facc273916c67bc16ee8f0cc6d17e293ccec999fd329f1f714da1c9624f74f66eebe9b45c983e8a322e45e6be95418e942ca9bf569e9b9f103cb1

  • memory/1660-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1660-86-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB