Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    17/05/2024, 12:37

General

  • Target

    ec9fb51a3ae81a581cb56038780cee60_NeikiAnalytics.exe

  • Size

    127KB

  • MD5

    ec9fb51a3ae81a581cb56038780cee60

  • SHA1

    8b32777f2021ee2acff13e7e3b5b2f1d165c2a83

  • SHA256

    7b0ba317679d54572178e752988352c1bc74b895aeeeb5592ded5201c54651bf

  • SHA512

    c9aa9c36866daedda8bd91b289963410a53c2d54d72fc722abe705860fcb65ed2a4bf0cb3763d01d69e760184f4fdb72beb8c4a6569ba8f47bf625c68355f939

  • SSDEEP

    1536:67Zf/FAlsM1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSC7:+nymCAIuZAIuYSMjoqtMHfhfu

Score
9/10

Malware Config

Signatures

  • Renames multiple (3425) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ec9fb51a3ae81a581cb56038780cee60_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\ec9fb51a3ae81a581cb56038780cee60_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2328

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2248906074-2862704502-246302768-1000\desktop.ini.tmp

    Filesize

    127KB

    MD5

    d31c8f2328692390ab2e6c5f15bd7efb

    SHA1

    0353e622132b046f028f940a49bc9f69de49573e

    SHA256

    a291e17241c34c5574f01858c65fa0baa999c5e0d4f9a6345e9ddf8f0e24b235

    SHA512

    375948c45e090e43d9a406d51cde9d72f1a31973bd1b816afcf5dd1c4032f0db24b897427e7b2176c13bf184fa18ded3497b7e7639edc890fd8a818913ff12ad

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    136KB

    MD5

    e77a847bda7da367f490226bd6f77b29

    SHA1

    5f43a1a009d2a8aa0af3236f779a1ceb74dcd5cd

    SHA256

    edc807248e3e84975c30cdd81dcf207b7ba708bb9e8d8a63a501d28209608b10

    SHA512

    0a6c2d2714577aba284fdd84170e293e48f061c22d5767568e1c60ee4b8bced0d4e446f2a200f3db7e40aa0bb1721602cd870440e28ad6ee42b2de793985f2f4

  • memory/2328-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2328-646-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB