Analysis

  • max time kernel
    150s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    16/05/2024, 00:03

General

  • Target

    5c41bd3c97975f8b135905c2131f5580_NeikiAnalytics.exe

  • Size

    109KB

  • MD5

    5c41bd3c97975f8b135905c2131f5580

  • SHA1

    4145565d3bd111f1a8355dce2a696f13b354d1ed

  • SHA256

    92e83dd4d45dcf8cc257233a435f09dec0f1bd092f793cae55cf94888ea7a7d9

  • SHA512

    3efda2c5bcec8538da90a86e82370e3b8db316ebbe511d7908e0290bf11005ec0eda54856dc03f235738ed8e8c471f56e16595f660205a2ca9140fd684c4d3bd

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hff+W:hfAIuZAIuYSMjoqtMHfhffPD

Score
9/10

Malware Config

Signatures

  • Renames multiple (3437) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5c41bd3c97975f8b135905c2131f5580_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\5c41bd3c97975f8b135905c2131f5580_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2040

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2248906074-2862704502-246302768-1000\desktop.ini.tmp

    Filesize

    110KB

    MD5

    949a642c1ef426ddf57e566c63a02602

    SHA1

    7db8a437c58e6c88bcaad3b80421c86ea8b53c2f

    SHA256

    6869847f1318907927d9f0338de1f9d8769c03f695e131540298ea14639d9af6

    SHA512

    60b4659999b11bbb1e634d774b2c5d46ae42d7297fad1a6edd7ed5ca581492368239e69de7e2dd5b7ac0f8619fd3fbbdd86c6d77bf23ff091baeb3808cff234c

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    119KB

    MD5

    fdd8fdd964787f9723d00777ec975206

    SHA1

    0ca5e9c7dde5509c3d8f0490577c1b6b3e2e29f5

    SHA256

    b02de853ce6f61e7fb22d3fb9f261b251a5eb907858e1a47ee2b6617cd35eed3

    SHA512

    34f050fe5aa1b4dfb2c6d44de581671825da65fb3b896166e8eb92bf59e9b53e32fcd62e382e6e358d264b4b5af7413d0371d62c4e1847f6ebcf75c671f1aac2

  • memory/2040-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2040-74-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB