Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    12/05/2024, 21:05

General

  • Target

    5c46c31416cf3b06c8f7dea7165e0a40_NeikiAnalytics.exe

  • Size

    129KB

  • MD5

    5c46c31416cf3b06c8f7dea7165e0a40

  • SHA1

    bc7284c22cbd0db67b503968ad5f3b48e1ca50ba

  • SHA256

    5db666bbd8f6facb7eb16acdade997760037f547d99974f7b4c942e1f6998880

  • SHA512

    c21d6a1813e7ce2fd450db7a5a7c58e828223fa1694aa7a07dd4c070aff5bca4c6ee98d920059267bf7c64143c083cfd578542c0c419ca70a46f0bbe832336f5

  • SSDEEP

    1536:67Zf/FAlsM1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSC3:+nymCAIuZAIuYSMjoqtMHfhffPC

Score
9/10

Malware Config

Signatures

  • Renames multiple (3444) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5c46c31416cf3b06c8f7dea7165e0a40_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\5c46c31416cf3b06c8f7dea7165e0a40_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1732

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2737914667-933161113-3798636211-1000\desktop.ini.tmp

    Filesize

    129KB

    MD5

    4c1b2b45de417d03c05dd0ed0a8f649e

    SHA1

    cb3304603ce4e656873588acd6ca79e3e7c23cf5

    SHA256

    1812f3a5bfb802acd54a94ddf6fe524c06f962473698685bfcfa275dead2ad72

    SHA512

    569c6cbd6c39d7549e92a9a9ae846481789d57a0406a7b84605279414a9ce07c9ce213f76bd18623fc014b6fe8fa1220d90facea7c39ae378524a03381552db3

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    138KB

    MD5

    f114095c4612e32a1ae1a17bd25db8f4

    SHA1

    bcc6cdc14e49d234a08935ab270b10176a46597e

    SHA256

    0b920a3027654c7f8ed48dc3ffeaa33f23732d0026c54d81099ad08b5782a251

    SHA512

    70a6f78232f4c36fa117e32707e5b83f28deda75f812873b7282ade8672152ebf9406920122a41d9d712e246a48404e05aa589f5946000e40b1c73e8ec15d680

  • memory/1732-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1732-646-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB