Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    16/05/2024, 01:41

General

  • Target

    74b108507b1219fb0229c84e4c2a5880_NeikiAnalytics.exe

  • Size

    108KB

  • MD5

    74b108507b1219fb0229c84e4c2a5880

  • SHA1

    9eb3bc7aae8d2b5856fef928a4a263bbcb28d67e

  • SHA256

    5459a13e7ce3d57bbded555654c36db472b4db1ab0d193af29996ebc5e2f0f12

  • SHA512

    a356bd89a627d639d7a4e601b2768e241add42ce535be8c9393a460f5f222b776d2a0cbc84e800ecdaa6b4f38de5ccc6b71b3cf14706810be58110f38e8b665e

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hff+g:hfAIuZAIuYSMjoqtMHfhffPd

Score
9/10

Malware Config

Signatures

  • Renames multiple (3452) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\74b108507b1219fb0229c84e4c2a5880_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\74b108507b1219fb0229c84e4c2a5880_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2064

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2721934792-624042501-2768869379-1000\desktop.ini.tmp

    Filesize

    108KB

    MD5

    66b225644313dabcea9500d6f04cc815

    SHA1

    9bb574fc857c83be747328b5785b597c3eb1226f

    SHA256

    f75d13428e3cc3632b21d344df4379a3df141caef5f899027aaff131821ffa22

    SHA512

    39373a62a2653feba83341ad0dafab088f2549be5799ae6cac8ff92d695e4932886e610c2bb0b8e62c4b0dab4d5e3f65b6cee5cc3d7d5728581377e10346c6ee

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    117KB

    MD5

    4c09e1d43f4cbb58181f64b7e96d08e8

    SHA1

    cb8520d90212d010d678fcd9e98e8710e1cd8a89

    SHA256

    12126578a1028a364a947ba76a615186f48b5a4d6b3b0a3bb8d171ee62935ff6

    SHA512

    3c6e13a0689ca61e9a7a7c2779bd6358255ce553382c0195ed6e6c4639e0c1fa2e9a35a54e46a93714d2b7c4b4d7bdf0e46ef50a595dac0d40181dd2fd009a66

  • memory/2064-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2064-78-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB