Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    20/05/2024, 09:45

General

  • Target

    d1748a7c11eb896df30b5644f96c072b_NeikiAnalytics.exe

  • Size

    72KB

  • MD5

    d1748a7c11eb896df30b5644f96c072b

  • SHA1

    27e2127ca9a9f95f91b839ede8f6f04f3e276e18

  • SHA256

    b0b26d22056c038fd9821fa8f4399932198e8b7b8487584a7ceb43913e3624af

  • SHA512

    115e3b21ffdda58a8f5519eac18f8325a3ce6b49be251c66526bf85c161b93c2802031ac0d68eb47b79ece2bdb17cbb7753b33d0a0dcc6aa135e982658b9b3db

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8asUsi:+nyiQSohsUsi

Score
9/10

Malware Config

Signatures

  • Renames multiple (3496) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d1748a7c11eb896df30b5644f96c072b_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\d1748a7c11eb896df30b5644f96c072b_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2884

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3627615824-4061627003-3019543961-1000\desktop.ini.tmp

    Filesize

    72KB

    MD5

    eebbd45c20aa362c52b6ef12b7eb1e54

    SHA1

    551794fb83f21b0642f606b35a2b4d085e282c29

    SHA256

    17866a944b31a73b798a517f5f52d449c49ae98461106ea3a6b5453520c3c370

    SHA512

    5bf41c53d6204d1795c2db89d821ed66a889dad12d74bbd1e4a4912d82df54c84dc981bb7df3be548644854f0175679d9de613130a10ce7bc6cb40aa1a9e5010

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    81KB

    MD5

    df781480bd92f49817133471400a6faa

    SHA1

    43cec9f95b709f06062100affb42d4ab111a8bf5

    SHA256

    2f197411f31b9236f9125370a10ed589be16633a634938643c0d1732797c14a6

    SHA512

    8f7802d9d1967807caa39dc503abd14fb0338ef2a037ab29286c74c72210eb4251b20d0e9e2d0e7ea9ccbbfefd5a81a9cc9d45927b8d58b489fd83e712ad2151

  • memory/2884-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2884-636-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB