Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 20:47

General

  • Target

    37cd87ef6a81d4c8ab31875da0f97370_NeikiAnalytics.exe

  • Size

    107KB

  • MD5

    37cd87ef6a81d4c8ab31875da0f97370

  • SHA1

    2d4591893fb67f19086ae23490f5d9526ce2d815

  • SHA256

    406a67e41ce10d2f4517b70fb36ac18ac81c6c953cda72b5abfa818a867507cd

  • SHA512

    d7ea3a301fa3ba93316b6480a921ac3527f068ed5e5cdb5f9ded6c4fe5c5143733a613b9b89d34a390b60b8023f00de46d017106c520233cb253b51396559453

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hff+K:hfAIuZAIuYSMjoqtMHfhffPnJ9

Score
9/10

Malware Config

Signatures

  • Renames multiple (518) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\37cd87ef6a81d4c8ab31875da0f97370_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\37cd87ef6a81d4c8ab31875da0f97370_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2200

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-330940541-141609230-1670313778-1000\desktop.ini.tmp
    Filesize

    107KB

    MD5

    bfe16a258cb42d15e63a5002afda5493

    SHA1

    dff0fac9487078575e35e9d0c162afefa1663346

    SHA256

    799644c82f1f5c14a81c74262cc63458dab2d14d26d766a8e9a7306489957e5b

    SHA512

    5ff09144bec00001ba5ccbe08ddef37cebedba3d502d79595cacc93006d6464f3a7b5a7968918c7fbc0f67d360d72cc0e711fbe1b75f71e92d8534aa755e0c49

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    116KB

    MD5

    98b681e7c9cee334c8e545d772a701a6

    SHA1

    ab49a8d10897109ee6e95b316a9453998784f325

    SHA256

    e95e0dd32ca3f32ddd40d77c0dc72e8840d64799f4763e6cf2cffc44e6289006

    SHA512

    d2e279334bf5fd1158e9f20539e7b995c4f2e9f1ea44ca1c64e2151b806f38675bd1252ea77b252b237167f09e93de7059ce54b0a1418fc53bc7bac2f7b82aa2

  • memory/2200-0-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2200-26-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB