Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15/05/2024, 23:35

General

  • Target

    55b125ba2601c0ec721b00b8abccddf0_NeikiAnalytics.exe

  • Size

    107KB

  • MD5

    55b125ba2601c0ec721b00b8abccddf0

  • SHA1

    c543c3bda4f48686336f68b5515f7312397dbcf6

  • SHA256

    e1580e9790721534179d40a7532546aa42920d4f0ef8f9c50d187595401b453a

  • SHA512

    e5595fb458a7f842d1ae2c698a56a89723886823c4ffd5a51b28ec29429604539b55d1e99c36430ac9e58e7a81c8c806eb9a6796b226aad2176f93d288010b4e

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hfRbn:hfAIuZAIuYSMjoqtMHfhfJ

Score
9/10

Malware Config

Signatures

  • Renames multiple (3428) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\55b125ba2601c0ec721b00b8abccddf0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\55b125ba2601c0ec721b00b8abccddf0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2088

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3452737119-3959686427-228443150-1000\desktop.ini.tmp

          Filesize

          107KB

          MD5

          178d19d143e6644d76e8a9960261498e

          SHA1

          72cc52f214da500c6a94433ea76a5736c32e82be

          SHA256

          6a6ca03d9784919241df395f0656533a0a0ad08bc75e15251857b3141ea4f311

          SHA512

          977ae22e6f9d0f7386e78e8286a00db730d557c642045b98ba0113c5e9c8d0702266d9c7f867719581a3f6e1ad592ae036e0a4c1df516f0d59173fedd3d8dcef

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          116KB

          MD5

          a945e15876958820271f9aa8a7b3b5dd

          SHA1

          bbdd21052eed8181e2b44b1708325fd0da2e8d1c

          SHA256

          3ff4b8897b62e987d225dfcd1a888482f4b6ebfb40211ce682836de2c86f0bd6

          SHA512

          bef10987430e36eec39ebca51d66e4d5a9af7175a3c977d14cd5403c80f2ec6187a95a7b500229e867ae1902a9149e40863f1e7f6a0ee0df16020d983fc77cab

        • memory/2088-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2088-86-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB