Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 23:11

General

  • Target

    545c2118f8c3dd1080c026a9a7f919b0_NeikiAnalytics.exe

  • Size

    109KB

  • MD5

    545c2118f8c3dd1080c026a9a7f919b0

  • SHA1

    e0f4b4aa988be131db9b32aa036204d11b269381

  • SHA256

    99f4364e5e7cebb86c61bba9f6d3e5900dafd61c3b251674806eeafab0ee534e

  • SHA512

    453a1eb19a4ef7b862ea5df65ddd30114aa8247a138c8a07bc05ffab93d9e7ee19a1d258afa511f164ea798b2655239e1501d6521aa2871884cdc09cd9de400c

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hfS/w:hfAIuZAIuYSMjoqtMHfhfqnw

Score
9/10

Malware Config

Signatures

  • Renames multiple (3440) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\545c2118f8c3dd1080c026a9a7f919b0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\545c2118f8c3dd1080c026a9a7f919b0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2392

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3691908287-3775019229-3534252667-1000\desktop.ini.tmp
    Filesize

    109KB

    MD5

    f8b562a8d97d9190121a4e3d90e8385b

    SHA1

    431579432239eae0aa944119f54f1dd219fc2887

    SHA256

    89150bacc005acedcfdc8cc54fe8014a71cb53ca34e46382de8b5577e62b2f56

    SHA512

    ad2737c7cbbc8648404e5db156d571f1e9db3b749c21fc88db9fa1b7233da955b36c0d6e9b2dafa05b493acd420956a2cd4437660ca8e91f61f8c6f5104c6a01

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    118KB

    MD5

    c1feaea5d63554957ca99d984de9e3d3

    SHA1

    a9353e811f7fccae6288a4d5f3eb08784e299c2c

    SHA256

    33d0694bdd156dce184d91cccdd6cf4c153a767592132ce3bb3e01d54f43a55b

    SHA512

    44a0bf0e10f762ac996d18f83029d625214bcbfbc8ba99c3862701a04892e6bc83e29de106aab33be930ab43e68a38cca5635cc054aacba21a3f48231c1c0058

  • memory/2392-0-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2392-76-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB