Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    12/05/2024, 04:46

General

  • Target

    6c6dda23ba7b7cda65530b47e6789230_NeikiAnalytics.exe

  • Size

    117KB

  • MD5

    6c6dda23ba7b7cda65530b47e6789230

  • SHA1

    140963b8ea4bb38e5ee7bccf7eaf4280e3efbbcb

  • SHA256

    ef8d261c1d422948a78822241d313a3f3ea8572dca0a73924dcb9a353f3ae70c

  • SHA512

    715d4746eaf0240b1b309b108db84dbfb6758cd47bfed17f9c2df9c1e684f5e91c41a3e201ef2d37dbfe78e8dcdf44d3ba5bdcef38f59b197c20970e4071aeb3

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hfliG:hfAIuZAIuYSMjoqtMHfhflixim0H

Score
9/10

Malware Config

Signatures

  • Renames multiple (3480) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6c6dda23ba7b7cda65530b47e6789230_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\6c6dda23ba7b7cda65530b47e6789230_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2984

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-268080393-3149932598-1824759070-1000\desktop.ini.tmp

    Filesize

    118KB

    MD5

    815edc5cc63a00cdb83bde7c178ed13e

    SHA1

    1e414524fa5aa94fce2655f0cc6c74a07d92a62f

    SHA256

    f955576d9398b63e9852d30279e0a184fbe796f02c6f4f4957632876f20dd759

    SHA512

    822a27f5adf7c483d64793e017532d102b3fac8e560afa46a86cb9ee315c5bcd49e0949dd6212a90bf5c7bdf9b38c53dddb02901e5e648760fb8a0950a8f6da3

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    127KB

    MD5

    6220bc509546c4241114c08f23d75695

    SHA1

    13fdd4acf9a7a77634047e639bd577be1cf6028e

    SHA256

    8993c1a2ec8f71d7fc05940beeaddd290c07efb2b1341187da271f5d4266dbf7

    SHA512

    10a1a786d5f149ad9704f87d56a25c9746338ac6991812c621f42b051ce8096e6f0ba318130111301680c9481fcb8a9ba6533ebbcac825aba5b6556c5a67f9b1

  • memory/2984-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2984-78-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB