Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 22:46

General

  • Target

    4fded5239363b119a9a65348573ca630_NeikiAnalytics.exe

  • Size

    74KB

  • MD5

    4fded5239363b119a9a65348573ca630

  • SHA1

    c44eace8f4431dd1574377f745f86194d42541cf

  • SHA256

    0e6bc29b814021e40b06c16b703ba8852e677f6e529ab81f27c1309d6ec29b65

  • SHA512

    8211e9d376d3aee9c7392ccc6e456ddb4faaf8b5b21762505b96ea15df13891d93cfa4032dd5fd7830d121c0dd22de5503ace01478a1d801c0f241ed7e51ee7b

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8yil:fnyiQSo0

Score
9/10

Malware Config

Signatures

  • Renames multiple (3431) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4fded5239363b119a9a65348573ca630_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\4fded5239363b119a9a65348573ca630_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1044

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3627615824-4061627003-3019543961-1000\desktop.ini.tmp
    Filesize

    75KB

    MD5

    caa31bdda344b9fc01af892c8c530fa2

    SHA1

    1a831a9f280d3b16083c28e27b4c6e4beec38bd5

    SHA256

    f58c5e0de21207482847bccaaed753c5df23bf5248f4afa48ec14f05e5196798

    SHA512

    6007088bae2c7c21f3a08455ad425a83c1f1a3625fa3df76f69114f0c024154753d53359199166b821f5ac9d65661a433eaac9075d45478e659b4d703d5a703f

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    84KB

    MD5

    9151f718a6036614f5a02e79c204b33e

    SHA1

    ac9317ce923456f504941514e9b9e516e88b6960

    SHA256

    a1f02e2951bf293bfa1c50038c0eda02e9b4caecfd4e3c27016648926272a05e

    SHA512

    95a5b356a0a802df91197ea35724ffa1194d6ec8cf4cf4c5670e9e43ae0fc345e75a06b83cdb439ce6311efbc9402d9eb611d99b1d05991dae1535654f39c937

  • memory/1044-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/1044-634-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB