Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 21:37

General

  • Target

    41f01e35afe5f7ea68ef58f5f68d50c0_NeikiAnalytics.exe

  • Size

    217KB

  • MD5

    41f01e35afe5f7ea68ef58f5f68d50c0

  • SHA1

    c500d41d360e14ae7099ddfa8dd456c78db9f4bf

  • SHA256

    07a1e9d22e31f238ce86947d87850e74cc516bd8b8baffacdd05a8b5286e35ff

  • SHA512

    cb57e3b52c013c16bd2d44d30906da21f85654e7978c7affd8a83b5831d50ddad9b96888d93524c1d34db4a1fefe07d99fd02386cd3b8b2e5118935b5baf9371

  • SSDEEP

    3072:+nymCAIuZAIuYSMjoqtMHfhf9fAIuZAIuYSMjoqtMHfhfA:JmCAIuZAIuDMVtM/LfAIuZAIuDMVtM/W

Score
9/10

Malware Config

Signatures

  • Renames multiple (339) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\41f01e35afe5f7ea68ef58f5f68d50c0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\41f01e35afe5f7ea68ef58f5f68d50c0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2876

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-330940541-141609230-1670313778-1000\desktop.ini.tmp
    Filesize

    217KB

    MD5

    6259051ec70b817dfd0c9c27ae010780

    SHA1

    09fbf168a8ce29c2658e646c758abf74bc23a9c9

    SHA256

    df3b504a9845e653c3cb75ef3a38468106c0580ca84935cd482e62a83c21608c

    SHA512

    c48e2d29a775c9fe11f261da4577f1edffd8f2e805959a0381f5b0cf86f46509b018bf0b6e0b92148dfabd5fcf263e5fc20cf4445dc3fb17874ee28f1c16a89f

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    226KB

    MD5

    80e860c0b50157598a9434ec172845f6

    SHA1

    fdba0c0f05d491df10e5355a47e73fae4614a0a2

    SHA256

    49f304403de74b535c7d7f5bb46710634a651f48990566b1810521f51b1d64c4

    SHA512

    329e43cfc31dd1b2d7715400b9b6aae04101bfe4b1e30f4dc8ba8dd4bcb81a68fcefd53310aed9d26281de008bce4af3ebe798e5827dd9dd109a915a57df6a1f

  • memory/2876-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/2876-68-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB