Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 23:00

General

  • Target

    529c162c8be8d29a918083924db8e0d0_NeikiAnalytics.exe

  • Size

    128KB

  • MD5

    529c162c8be8d29a918083924db8e0d0

  • SHA1

    726d9eed1882299825e8477685ecf23897ae3b5a

  • SHA256

    49bd0c406726526c6e068f7b2ca20617c3e9acc280660671f4b093bf615777e1

  • SHA512

    9cd2740bf95102b026b06b105009104b9eb17da00860da2b101cac36d3896adc1e2716e55b94835d865e95c1ed0282081cf64ba1b3f4334427c7204321dfd0d3

  • SSDEEP

    1536:67Zf/FAlsM1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCm:+nymCAIuZAIuYSMjoqtMHfhfL

Score
9/10

Malware Config

Signatures

  • Renames multiple (3434) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\529c162c8be8d29a918083924db8e0d0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\529c162c8be8d29a918083924db8e0d0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2868

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2297530677-1229052932-2803917579-1000\desktop.ini.tmp

    Filesize

    129KB

    MD5

    e075119a3af8b8011bcffc40ad7916c8

    SHA1

    0b84c2ae1f6c55c92b07810c79b7ed20a77bec14

    SHA256

    9a9020245b1bfc4826d15920da635eb1751e2b223a5bff5cf606a9deb8875d8e

    SHA512

    10274ee9e3eb85f50cf9dfb7e189868ef34f69c53b2cc1bab9a1f9de64bc08df70f4d47beb86ec86492f4f9ac374f94b19bbc4c914e84b450ba4c54a582baba7

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    138KB

    MD5

    0013c40c3ee7d7047737839577d66e4d

    SHA1

    1832b81121c597c3326806c15f01cb0d966d22c0

    SHA256

    81c7bfffa25d4671fed16bdfdeb8b42851207315bbf0454d5a0cd0825862d5c4

    SHA512

    0b9ba32aed9290cd2516f69de46677f63ff230a5cd357c74dbf1c6331c252b70ddb7b740af42ca7a5c892e05e11ab3357813555da5b4421a8e6954e2c950c555

  • memory/2868-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2868-532-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB