Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    21-05-2024 19:25

General

  • Target

    0688130e6e945006f2472fd31a8bbdd0_NeikiAnalytics.exe

  • Size

    106KB

  • MD5

    0688130e6e945006f2472fd31a8bbdd0

  • SHA1

    7129c18c26cb82044925acd1715f38ca5460052c

  • SHA256

    53c864b18c6356bfe686b33f1a246670c229e222cb52e8ab0adef2df3047114a

  • SHA512

    1277a63009437553eff46191db849ef5c2f5065ee540ff5469aa90cc3a59a6aa13fd57e88eff744ab7b71e3b81ae38a77334a545309f4c2f77bb9ce146a5351b

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hff+I:hfAIuZAIuYSMjoqtMHfhffPh

Score
9/10

Malware Config

Signatures

  • Renames multiple (3449) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0688130e6e945006f2472fd31a8bbdd0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\0688130e6e945006f2472fd31a8bbdd0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2364

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2721934792-624042501-2768869379-1000\desktop.ini.tmp

    Filesize

    107KB

    MD5

    147c20cefd47d53196f62db676e2ca72

    SHA1

    fb28aa60fbc25caf942ce14a0ae93bc33c8645dc

    SHA256

    47442941c543834ad037feb51745ec8afb7d15d26c6fc29c0e6ee6dce74ce338

    SHA512

    b8a84083e2d1501cf7d98dd268de99dc42f568d8beef8bb2a8f1bd9676ae4507397bb1137bf52351d542ea02421628bc88178ab7a0c5fe6a744093bceb67086e

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    116KB

    MD5

    7a768568bad0c13a298505d57df2694f

    SHA1

    6e1fc683083b52c66fdd6c6112c8ff11f3cb8d09

    SHA256

    e30c0c72ec57a5c485e34d347f7d0891b5f7d1ddc135d934f650988a65bd7269

    SHA512

    d672d1bda1dd8a66dc02ce411ae4a6198569429b174fface44ba87d8d200d6a656e180423f73b481e70cb477cc7b8de4c75412d9516d14ed22f7fc848377f0f0

  • memory/2364-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2364-78-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB