Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 22:09

General

  • Target

    4862d74c08656309a16d744fce4a9320_NeikiAnalytics.exe

  • Size

    111KB

  • MD5

    4862d74c08656309a16d744fce4a9320

  • SHA1

    e76d648909aa3ebf33194caba29e93cb896bc394

  • SHA256

    bdda81b2285cb3e85118104c8a552a1ee06b19637a216a6ce486c3e39ffa8798

  • SHA512

    dd7ec916540450b9023457110d9cad395a968834ae6e32c1ccaa052d232601964b0d9365a228e4890cc1c1aa22d788ae7c758b3a88deac3e6a834b80456160b9

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hfS/n:hfAIuZAIuYSMjoqtMHfhfqnn

Score
9/10

Malware Config

Signatures

  • Renames multiple (3434) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4862d74c08656309a16d744fce4a9320_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\4862d74c08656309a16d744fce4a9320_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2096

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3452737119-3959686427-228443150-1000\desktop.ini.tmp

    Filesize

    111KB

    MD5

    0fe34ba85c8c1ceca0189dad04d16900

    SHA1

    8e7d899dcd4aa0e10334ee07728f25e4a05da2b4

    SHA256

    ac7bc2539f7fa490da2ad4226d9fc461aacc48db12d571a732a0a2524b6ab8e7

    SHA512

    57f0c62a0480594c7de11204c1505fab111ece498c937da3dd6dc91b2d501616d55fcc269a8a48ef22b3281ff52e9aacc0775c6960117333ecac8bc6bbc66034

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    120KB

    MD5

    78bf8d950f584f25b35970bfd3221aa3

    SHA1

    54199194ebe02c535700c4e86b285a6a10963282

    SHA256

    0d51db0fe93cdb99135de9459fa57f833e290ce25ba38116b3ef444ff3ad1ff4

    SHA512

    da371f697b245c7d8c3d32fa3325b9e22577ac4a4036d6557790a4f21cb694fd7da379f6e14be5c4146fa5c00f9ba75ea77da7a9beb056c8cbe7d61294a04e9b

  • memory/2096-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2096-74-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB