Analysis

  • max time kernel
    149s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 20:16

General

  • Target

    959668a67fdd854b56b7386facc28090_NeikiAnalytics.exe

  • Size

    137KB

  • MD5

    959668a67fdd854b56b7386facc28090

  • SHA1

    02c969c64e9e20711bb00b53a34995f5fa7c4524

  • SHA256

    d9ce548ccee86f992574905fcb869b10ab853f3fb1e4e0ce24b71d0f65193339

  • SHA512

    25838caaa0466346084094402858be59ae69da31ff9aad5c036f01cacd158e8b53c4e3a28664675dd774b472a8fddb4ea8ede138685cb158fc419bb0251072e5

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8yi61:fnyiQSo/

Score
9/10

Malware Config

Signatures

  • Renames multiple (516) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\959668a67fdd854b56b7386facc28090_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\959668a67fdd854b56b7386facc28090_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1556

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-330940541-141609230-1670313778-1000\desktop.ini.tmp
    Filesize

    138KB

    MD5

    8f9eaf5c221e2207aa96b56c382a7a33

    SHA1

    688eecb10e62a71626af734fd9bea4cd3ba27b17

    SHA256

    ab072ac00a8b04186ca11f5323691b8b1349a468855af5d9d2712b0f5fbe6d3a

    SHA512

    f824527c9748e849a4fc97791b9203a1b0b4d2cf6ec87af693d1ab84a09d0520ca519db48fb6e69ddfb590d2c84d3fd116c7ea69ce18f02db136a53a33a29316

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    146KB

    MD5

    05aa0064d401682226203afd3a6df0fb

    SHA1

    85354a63b074ee615504abe539b735f22203fb92

    SHA256

    eecbe59290e07cfab9442933b788a705612c16fc9802db2b95bdd98ce3df356c

    SHA512

    539803fa0bf220040db505b6c4a8e3fab530daff135b1939a4f29e9c7bee43a3e3f68cef2ae0983a7179cd9d1365d2425e3ebb9aef2e2db7af5937e51290c021

  • memory/1556-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/1556-64-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB