Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    12-05-2024 13:28

General

  • Target

    1541a49142ff44d8981a0f8678f6af10_NeikiAnalytics.exe

  • Size

    111KB

  • MD5

    1541a49142ff44d8981a0f8678f6af10

  • SHA1

    265329d13bcaf602140e3f636fd29905e1376bab

  • SHA256

    872ebd9ed967038940e534daa4492f9407fd3c7970a4b5ebcc570788c24d76f2

  • SHA512

    64b2212b34b2befe915b045df1aaa20ead6daa0c517ea3e96ae1619fe4534f35e3102fc4e48adcaf368117126e7f358954435d8c69b1c49deb71d68073a707e6

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hf5SI:hfAIuZAIuYSMjoqtMHfhf5Ssk8

Score
9/10

Malware Config

Signatures

  • Renames multiple (3444) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1541a49142ff44d8981a0f8678f6af10_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\1541a49142ff44d8981a0f8678f6af10_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2208

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-481678230-3773327859-3495911762-1000\desktop.ini.tmp

    Filesize

    111KB

    MD5

    bed5cad6667155169cc10cff6cb35550

    SHA1

    f5493b27ccffbe488a36ba8c27b22c741bc17808

    SHA256

    509e645f3a8cf9eef72838a59b3d536a887af4b151d29bb87ba0d178bdadb1e4

    SHA512

    84baa3a9d9e8b8e08a2665840ba47e2afeb6f9a237b31240e02cc129b3a3a5d830c636dedaf51d966079746d68bf8de78e6e2f161f25f6e083033ccdb5e8e352

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    120KB

    MD5

    5bded54700fb2626ab68bf5ff68ead1b

    SHA1

    f675322b080afc1345b8ff40c9bac1b20dfe6d3f

    SHA256

    3d40b2ca0a8626f53e6dda6a9ee03a22dffbc153397c4c4a23f8cafa4d1814db

    SHA512

    01bc6a0cae96aeb9f86d220d7f9fd82f4343f28102fbe91f1382b037107b2260e37516ec9e148dc76e39d5382b5b24d4b5902e1b5861b0ae1441aa79dded6d71

  • memory/2208-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2208-78-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB