Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    14/05/2024, 18:57

General

  • Target

    10b722604f1b7203f482e4d22e2b0530_NeikiAnalytics.exe

  • Size

    151KB

  • MD5

    10b722604f1b7203f482e4d22e2b0530

  • SHA1

    6c1a5f6d1dce9f4fc9b289a3778af8566f8c3f62

  • SHA256

    7a5a9d363b2192d297d0cd46bce0466eea2eac65e78fdfdde183ceecfcf982f2

  • SHA512

    bf0c80014bcb0b0c33a41369b0b9619994559177e2317095f4ea7fe8c6a546fbea0e7a683e89978e1d21fb742ce33a4a43199699d350bb044081f4ef20ca6146

  • SSDEEP

    3072:KQSo1EZGtKgZGtK/PgtU1wAIuZAIuZnhyKoIWbsHfySkT5GeCyi348oWGRPOzkju:KQSo1EZGtKgZGtK/CAIuZAIub

Score
9/10

Malware Config

Signatures

  • Renames multiple (3437) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\10b722604f1b7203f482e4d22e2b0530_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\10b722604f1b7203f482e4d22e2b0530_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2592

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2248906074-2862704502-246302768-1000\desktop.ini.tmp

          Filesize

          151KB

          MD5

          c09b2c941f475b7673224f8e70a0e1f5

          SHA1

          299523cbb85b72214e690cf4c73f89b260299909

          SHA256

          5213dbbaabdaff6f9953b08dff3a99985a2bbcc84ba39fc9a9f5dfd7883618fc

          SHA512

          ffd9c32d059014e30cfa7450fb0db54ecc8cde771c081181b20c03b3cb12085645d001b6991669e7410ef4d8ac74e99cb32f9a30f57930da505c5ace1d0ba32a

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          160KB

          MD5

          24ba7d63ced6ecb67942468bcc316167

          SHA1

          339aa305bd8499dd23ba74df737b26f1ad4c5cb3

          SHA256

          f5b45f69a8161435b9a3d768b7efbcc15c4cc83e768bae2f3cfe15153aba73c7

          SHA512

          ba1351910f1577ce6eee69d39178be2fabd72fdb479e4c8346853722aa396b1b95044998f2d5c216b7e7e9f07ea80408a34443b0f4ed68d658c7de4edaaee40b

        • memory/2592-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2592-76-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB