Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16-05-2024 16:05

General

  • Target

    e44cff39a72301b9c467bc6d5aa104a0_NeikiAnalytics.exe

  • Size

    117KB

  • MD5

    e44cff39a72301b9c467bc6d5aa104a0

  • SHA1

    0b6c23a001d85ce1c5b1f0afa4552238ab1985e0

  • SHA256

    2e2eaf1cf52717b6574566023efd9c875532160942973fa3e720933c74617cd7

  • SHA512

    c920eb7f5013b7b11922f864df69bf14df99411bf0728f5bbedcbf8c31bcadf80e4086762513cfc4d745cb197a7b87c5be94862e878a1a74f84cb831b82a392d

  • SSDEEP

    3072:hfAIuZAIuYSMjoqtMHfhfkrVa5zYrVa5za:hfAIuZAIuDMVtM/4yCya

Score
9/10

Malware Config

Signatures

  • Renames multiple (487) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e44cff39a72301b9c467bc6d5aa104a0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\e44cff39a72301b9c467bc6d5aa104a0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2244

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-330940541-141609230-1670313778-1000\desktop.ini.tmp

    Filesize

    117KB

    MD5

    20a2134b92740e372effe74e6196fc9b

    SHA1

    472aaeca90406acfee6d69f04491de2b419b63d8

    SHA256

    928484d43ba59b641771ec84759c5be7d7c7c1aabba9443133b3c079a3f083fd

    SHA512

    863ad37e0e8e1054dd90662ecd110904428d335e4f59faa76984e3202f53bce90c6b3768e094c9ad411dfac2bee4fc1fea0496b9c973038f31f9f12205c6b42b

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    126KB

    MD5

    a423b9fb665d7792b467c090714f84fa

    SHA1

    5bfe44d544ba1cd3aed9977b57b2c02e216364c3

    SHA256

    903aa05c00cee74c1f468876f83ff9f61252fea601511b288c59fc66f72479f7

    SHA512

    f064fba3c60dcd69a2cc915aef790afa767294f23a0a06a4f564cfb8eb54fa112c317acdcdc8b0573e5db193cc2810cb9353c5e3d98294980aa8c0c2e047c282

  • memory/2244-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2244-26-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB