Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    16/05/2024, 06:03

General

  • Target

    ac02a4adb986fa3f868856f857411450_NeikiAnalytics.exe

  • Size

    133KB

  • MD5

    ac02a4adb986fa3f868856f857411450

  • SHA1

    131f229cf3921fd99ab7ccef010e6ae1a45baad3

  • SHA256

    2b9e3631a76f5a79ce58275140985422464a49b626be70e551dff5ecaab26e5c

  • SHA512

    705416d928215f4b3e87ea2a4e468202f94e55abc7cddac83c6ed64680ed74cada49a3aab8ed5589ba01dc0827443b5f3e6c1799bdb76a07d10704f15731c48f

  • SSDEEP

    1536:67Zf/FAlsM1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSC6:+nymCAIuZAIuYSMjoqtMHfhfLq+

Score
9/10

Malware Config

Signatures

  • Renames multiple (3444) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ac02a4adb986fa3f868856f857411450_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\ac02a4adb986fa3f868856f857411450_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2060

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3691908287-3775019229-3534252667-1000\desktop.ini.tmp

    Filesize

    134KB

    MD5

    65761147ebf5fc8a406911372203096d

    SHA1

    5498de6876960e1e8789ecc9e9f012cabfe41f48

    SHA256

    d1c27610187e5be136a3b4af75d2a09c84cbb93693f1097e98e377b8e2337767

    SHA512

    a027bebdc397e32cd1a79088fa132c9ce57807dd17d00b7ba7c071664dedbd30c32b81aee3feae33038fbcc11ee628b0ad3a4525f73b2e2a48ed404d1ff61cc2

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    142KB

    MD5

    6d03424d190803ac7ab9085a483e495e

    SHA1

    4617fd04841269a9cd617cf32e1915c69ca7ee5f

    SHA256

    433717b285ccd7b573444eee553d9feccc521e4a010c138d5d2fd55bb1910149

    SHA512

    b504b0cb3c65bf5b63baebc0fe856f00d4ecac551072b4a16fe18fc5a734239bcd2db2359ae97831289b8a732b7787fd0b5d2e5a9094ef0ebd97c8c99d5e9468

  • memory/2060-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2060-648-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB