Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15/05/2024, 07:51

General

  • Target

    a7d72d08689ba1701dda70eee0482cd0_NeikiAnalytics.exe

  • Size

    113KB

  • MD5

    a7d72d08689ba1701dda70eee0482cd0

  • SHA1

    2d90b3d3e018c87138b959da8e60c8d1ee93e3c6

  • SHA256

    1b42e0ccdf750f7f7ca9d874609534850ab5bebf21327c71abce35192337ef5a

  • SHA512

    66305a6fa2826020be5a3aab0b13611aa5ee00ad8d924b43e454424c6e3df7d24ff8b355c53fa93b12bd8d8d8bc58cc513b18b98b8b82336e59938aaf03a937f

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hf5Sn:hfAIuZAIuYSMjoqtMHfhf5Ssk/62

Score
9/10

Malware Config

Signatures

  • Renames multiple (3434) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a7d72d08689ba1701dda70eee0482cd0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\a7d72d08689ba1701dda70eee0482cd0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1924

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2297530677-1229052932-2803917579-1000\desktop.ini.tmp

    Filesize

    113KB

    MD5

    f6b3e3a64da1d7c5003f1f2333d12695

    SHA1

    bedb8171ab44d693bd98bdd70c429460b87ae8c8

    SHA256

    14a1ce9c6a707b282b748efabec3156354025d06f4ebe5d5c34c2d9dfc6ea812

    SHA512

    32c747755fcc453bf853e6580356cae7e7916fd730917e61f65425e4ffd36ef1235a2ce363e66c2b8df15eb4c32a37ed9d9bbfc6a28d8a8c7d08cde2fea05cb8

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    122KB

    MD5

    f26c7944cca241ceedc1ce4eb4af1de4

    SHA1

    147ba3a756b3fc17c3abf1f8e8a090d4bc07e6e5

    SHA256

    005b99f477d3cb1d7cade5c7640accadab9e21c700040c5bc472dadd61cf8a42

    SHA512

    793a269af381fe30bda9b1a6de2cdd14bf9f53261e5d766c82c5d4fe09df6a76567fbf91dda3508be8cc40688d4be0447197d35135cd588775aa526af22395f0

  • memory/1924-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1924-76-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB