Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    14/05/2024, 18:39

General

  • Target

    0d6c2c03cf85df3aaa681ccdd4ee9200_NeikiAnalytics.exe

  • Size

    168KB

  • MD5

    0d6c2c03cf85df3aaa681ccdd4ee9200

  • SHA1

    88674175b0a41d2d8c846f456764171bcc5c35af

  • SHA256

    de4fdf4f8f33762f3fd0dcfd33cf7c999612c86a2839d5b265b8dc29e0b58a33

  • SHA512

    ec82c5ac01eedc4c524cb31f49bcf967eb2efb349dcf6c84ef6c5bcdb6cbe7723214d4d0216594e15adb5dc113aee58e4f098fa03ffa36bb80fa93106d316efa

  • SSDEEP

    3072:+nyiQSo1EZGtKgZGtK/PgtU1wAIuZAIuZn+:JiQSo1EZGtKgZGtK/CAIuZAIuQ

Score
9/10

Malware Config

Signatures

  • Renames multiple (3326) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0d6c2c03cf85df3aaa681ccdd4ee9200_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\0d6c2c03cf85df3aaa681ccdd4ee9200_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1520

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-481678230-3773327859-3495911762-1000\desktop.ini.tmp

          Filesize

          168KB

          MD5

          618c8f81c8783b1c9fc01eaac9791992

          SHA1

          57c51c36412bc3c3723c155560c946b4c385e40d

          SHA256

          57911f4a4ac31b06930e0e67f568b438125ef6d1e28dbcf31a30329e5a065580

          SHA512

          6dffcb7b913e8dc3086badaf4052552888257f5c53b407ac03091399db3487cfd0297ccb82cf2ce8898dee71ab09494e69512c38c8e06963160e28307dd47a9d

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          177KB

          MD5

          25d2e0ce537eb3931a6593846b7523c9

          SHA1

          0b2bbc0481e17f6cf60780d9d4bf76f4cbbab895

          SHA256

          8ae5bc486c66f84e67e42277c0f519d9ab670c83b612dd874baefda1f9f64271

          SHA512

          818301c37995cb70cfc4ad0227361a5a095d52ed4372ceeb5c036ea69ab7889c4a02de10e9abc764f7bc53c229a49b5452f4829012e24128da3f4ce3f46250ec

        • memory/1520-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/1520-442-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB