Analysis

  • max time kernel
    149s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15-05-2024 19:18

General

  • Target

    1d050140171aec5611f93932abadaf00_NeikiAnalytics.exe

  • Size

    103KB

  • MD5

    1d050140171aec5611f93932abadaf00

  • SHA1

    726679bde0bad7085863fde913eeae63c228c9d2

  • SHA256

    6ca34b8f3c307f21d87138f1239b0a2060ae6920e98a4c96ecbfe004fc570d70

  • SHA512

    98461b3258c900ad107e392c1612c436d6ac9bbe4dca9f34cafd9de533b0ecb1ab3d7d58aad6b8e74b7896973dcfa9f21b8cefce37b7b0642217a7dfbc3db2d6

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hfYcS:hfAIuZAIuYSMjoqtMHfhfYcS

Score
9/10

Malware Config

Signatures

  • Renames multiple (516) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1d050140171aec5611f93932abadaf00_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\1d050140171aec5611f93932abadaf00_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2172

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-330940541-141609230-1670313778-1000\desktop.ini.tmp

    Filesize

    103KB

    MD5

    3ec0d9c27d774f29314961e8c36e9f81

    SHA1

    6654a953d069fb59a6f815cdc4a00d01c87713ee

    SHA256

    235ced9aa4ffa187bdf84684f21aece419ac9699b1d9dbdf2c5c67195649f881

    SHA512

    8ef7404db34f03a995e7d23fcc27180a14a110974d13fd1aa9b0fe7a2125dce798e6eda0fa57cc480ebd4ff449fd08f111af5b8cd3aa4c2e2fc33e37ba7984a9

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    112KB

    MD5

    0a6cb6ce2af6b5402e88da0f2c3e9bda

    SHA1

    34d2991cc2f98672fc799036385f8d2cc44ef523

    SHA256

    c3fdf23a60944078dd0714134c87b0cfc8ac25c22d60409a9220830e0222130e

    SHA512

    1519e38778a83d6bac871c845547183518c61a86e39c209c3e068fd2522c42af14a31d45bd417f934184726fa4d45d856f82da655dcc3f9bcb58e58320834a10

  • memory/2172-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2172-26-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB