Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    16/05/2024, 20:45

General

  • Target

    2fbac6a4da5bfb5d106b84c886484bb0_NeikiAnalytics.exe

  • Size

    114KB

  • MD5

    2fbac6a4da5bfb5d106b84c886484bb0

  • SHA1

    2bad989c4915b619f541516db1958f3c2d5a12ce

  • SHA256

    c0109a96ade02667a48ff166a557d7cfeb8062e78bd3d0cd6c906e9c6fa761e3

  • SHA512

    8230d47adcebe575ee58cc8e7e3764ebb7bdb36ef5e1697a9a72c4f434ef563ea17c7a06aeb34746fa0eef3d27077a0ae8dc1e22b07d18d8690419d9075ef428

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hfJXM:hfAIuZAIuYSMjoqtMHfhf6

Score
9/10

Malware Config

Signatures

  • Renames multiple (3441) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2fbac6a4da5bfb5d106b84c886484bb0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\2fbac6a4da5bfb5d106b84c886484bb0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2916

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2248906074-2862704502-246302768-1000\desktop.ini.tmp

          Filesize

          114KB

          MD5

          7176a1bfb8dd4bbb743458237b59dafb

          SHA1

          b436be6dd953bd8a9a0def6d0ea197ac2db89c4a

          SHA256

          be02045c676352638c0421442041dc51f5d2c9466b859090f311730d05760d0e

          SHA512

          54515ee2a192f60fee0673427c2b83504fa9e407415049ee02658dd3be55b7212a95400f7f5f2e89e90184bbaeb8709db97e8fd9bbe7cd1da6cf41fe997f1cea

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          123KB

          MD5

          f2a09e4b718d297c77b17593ab5a9a25

          SHA1

          4c9e14ed76d7e463e2f49452146245f5d5c5a1ac

          SHA256

          1506a1aeab84c1b0823a0b3e54e8d7b934657bb9dda48c80ab0d9acb3e4df193

          SHA512

          25f4b02f083cb2c077cd0a1e3d9bf448c5b7109c05d10eb4698319e9a4ffa7c7929069bd9255ce80a2de4fd905b2ae3407e517b3bf85c8b8a0151a73c4ac2194

        • memory/2916-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2916-76-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB