Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    15/05/2024, 05:14

General

  • Target

    87012b027a54e9105ed25f8a6d32b8a0_NeikiAnalytics.exe

  • Size

    108KB

  • MD5

    87012b027a54e9105ed25f8a6d32b8a0

  • SHA1

    1b675db0a1bcbb04d91f88fa421bc7e651c2f264

  • SHA256

    c89116c50aab1cd0b48d4dc18c58647c7bbf15b507253feda861f5567c119546

  • SHA512

    2806b519c356c0fc68fb6f9d1ad968c0732690cdddbebad9ac6f022682f8c8b20d527aeb29e9da2f21e84f0be8292b7a1c8a07f02400c6d9d56a5e7b76c765f4

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hfS/Z:hfAIuZAIuYSMjoqtMHfhfqnZ

Score
9/10

Malware Config

Signatures

  • Renames multiple (3442) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\87012b027a54e9105ed25f8a6d32b8a0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\87012b027a54e9105ed25f8a6d32b8a0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2016

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2248906074-2862704502-246302768-1000\desktop.ini.tmp

    Filesize

    108KB

    MD5

    c9dadb5913a4626533226987e09c72a5

    SHA1

    5d1e26096d0f77a7159043f6be4bc5ad99b11e5a

    SHA256

    5be1697a9ddb0715456965eeac50e2cdd9cf358f1909a53996b1ab5f218d7f17

    SHA512

    7eaa95811e86d79142d83d9113942a42f99883c5bb85b2cd6064122e534b7321b0ad2ea17b0068b9b1b4857bd22744196b705e6ceb99a7363fcff00549351fd0

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    117KB

    MD5

    6faee123e217cebe819bf98b90bd4fc2

    SHA1

    259cf41b17e3440664a15e32bba7b00630f8f82f

    SHA256

    254d5431afd782526662a63e1424ecdf63e8e82ff2dae1b959ee47b96690afb9

    SHA512

    209c936e511dd020b41d70b1c5e85cdca3116d905e5a82fcd2673ee27a065006711d8dfd2692da283dffd1f595f4b5d17e614fd701ef32b72256885288728ab0

  • memory/2016-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2016-76-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB