Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 20:15

General

  • Target

    a1903136a42bffd55b51d1c260e038c0_NeikiAnalytics.exe

  • Size

    40KB

  • MD5

    a1903136a42bffd55b51d1c260e038c0

  • SHA1

    0548edf16967861e18b454ef9ee547ce4c258e67

  • SHA256

    af6f228e74b7a09c9a6d2cc48e5d0fe69ff1db16154699cc2ee9f74b3be3d974

  • SHA512

    969f825e7c70a76724bcfe2b344067a3ba0f41dd8249bab08eba0965b84af829489b60d46c86c3b2e2a14774551da3141ff213b30cca1f1d2ab8b6ebfd0364df

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAF5:CTWn1++PJHJXA/OsIZfzc3/Q85

Score
9/10

Malware Config

Signatures

  • Renames multiple (3437) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a1903136a42bffd55b51d1c260e038c0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\a1903136a42bffd55b51d1c260e038c0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2444

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-481678230-3773327859-3495911762-1000\desktop.ini.tmp
    Filesize

    40KB

    MD5

    2c3d9d1e3f857b5fc042a693b2b5a288

    SHA1

    3a13792ec3722ad986e1c282a7f3ad1b93513630

    SHA256

    c3ca5147ffdc202f26695f1eef4714105292cd556262f8615869d75f5260fb7f

    SHA512

    5f4e30c4d18236d3c1debe606ca5dd688bd113f38639fb8e6496ec415954449330e09fbce8bebaaf242c393abc5392185be0d6b100c5bacabbee0ce270544344

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    49KB

    MD5

    c68664193fa3b143fb31393024ff5ab6

    SHA1

    cd7b21d2884f16ffeb7dde379aa1eb1fd4935b48

    SHA256

    9d0e6fa67d4b11ddd6f8d4031077d313653dd48d3a1411133f0be4b0cee8f562

    SHA512

    f917399911f054b7f6c98f6a8b4821c176ac52ced4791f2f5d2cadbad1e6e19f64ab0bfc1068b6aa996cd8e6eb19ced4dbf97c097ebfc6b7416e596b91e31cc9

  • memory/2444-0-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2444-74-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB