Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 21:37

General

  • Target

    41d2c387f470e6406be9bcde57772610_NeikiAnalytics.exe

  • Size

    219KB

  • MD5

    41d2c387f470e6406be9bcde57772610

  • SHA1

    a6ba31e69cb629d68ab7dd408dae7b06b6787747

  • SHA256

    5b5b3fb978809d16969dea2a09186f085405b049792348f5b8af3b3d8cd67330

  • SHA512

    8bdba481f05b4b55541f4730b050faf6fb064c780c281e562a15064c987f32337e82f8069782d6b4e8a85ea7fd2f9ca86194c7c3897a211b837fb499310ef6ff

  • SSDEEP

    3072:+nymCAIuZAIuYSMjoqtMHfhf9fAIuZAIuYSMjoqtMHfhf+:JmCAIuZAIuDMVtM/LfAIuZAIuDMVtM/4

Score
9/10

Malware Config

Signatures

  • Renames multiple (335) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\41d2c387f470e6406be9bcde57772610_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\41d2c387f470e6406be9bcde57772610_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2304

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-330940541-141609230-1670313778-1000\desktop.ini.tmp

    Filesize

    219KB

    MD5

    ad557e3ba680f433501c19db01bc6b96

    SHA1

    5b34d073bf49143e5b4c6a4dd13bae559d35f371

    SHA256

    76393119cef94f18873c68221a490811ef03c0a717eac6441e78464bab8b9efd

    SHA512

    1dde06ca727cf0880321bddf4e43879c5e033a5baec1ec740aa96b0081585ced1401c1aed6d7971253f4deb157476b11c804bc4780ca8e39c48ac6eb682feb70

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    228KB

    MD5

    62f34a232c90128887ef9a668f8d55f2

    SHA1

    eca7a10a76ef8e0fffdd7d7725cd4ee6e343589c

    SHA256

    f92f73d072f987f4f16cfc99e7dcca70c27fa7d63203f032325d8acb077aa670

    SHA512

    0bb002b35794cdb4c6f09173a31d3b9f775bf00d5c9e045bfe93032f429cacb166a1ef919e890e83bae2edbb4d5b8a02bd408e47bb90c755aaa524bf8b0992a7

  • memory/2304-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2304-64-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB