Analysis

  • max time kernel
    149s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    21-05-2024 19:17

General

  • Target

    0485bb47947e51d2364ecbd64ca80570_NeikiAnalytics.exe

  • Size

    102KB

  • MD5

    0485bb47947e51d2364ecbd64ca80570

  • SHA1

    74262c3e5154245a5135b1b3e4986669b23558d5

  • SHA256

    329d2b24cdfa8a85bb97b4a3a0fba485fe846fd650da54ee6890d3fcd83bdbc6

  • SHA512

    9a0581c7f3e4f7d0301abc1ab104a82fd7a2600bd11882606f2a66b49a5ec506f347239d83164ca21dc1a7add68ee562b2df05af1074c9b0fe9c05a73aca605b

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hfRbh:hfAIuZAIuYSMjoqtMHfhfX

Score
9/10

Malware Config

Signatures

  • Renames multiple (3436) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0485bb47947e51d2364ecbd64ca80570_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\0485bb47947e51d2364ecbd64ca80570_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:3028

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-481678230-3773327859-3495911762-1000\desktop.ini.tmp

    Filesize

    103KB

    MD5

    2bd6010f2b3a820f9f9692f44fbd5e62

    SHA1

    9c508791b90f58a3285579673d50fc563740f5d1

    SHA256

    a46e17be6d5df603d2454bf6c88bf0283fff0b01fb2495396c2952c4ac26a673

    SHA512

    93c44176b7b09edd4bb733c83cb03822d88e9c9e676dfabd33f804683acc19df11985e78fb9889035420a202ded833d9ed3a5d2ed50f4211d52e8c11efdcd29f

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    111KB

    MD5

    4ebbe9a94158df1d9a5e3dd99ab3eec1

    SHA1

    2e6e4557cd466acff623d46fc43a4fc1e6091606

    SHA256

    908439b84092a56dcdca865705acc697471320fd1b30993f117b5b6ca346f0f5

    SHA512

    1cb6530d322d6fc9c26639256be987af73f04ecddcf7c7f29895e41ad20f9361ff35a309a9a723a5e310fc42dd24763e84b894b38f3bf2519e6c2351ebbaac38

  • memory/3028-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/3028-76-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB