Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 21:06

General

  • Target

    3bbd604cbb66f5d275a67922de528db0_NeikiAnalytics.exe

  • Size

    110KB

  • MD5

    3bbd604cbb66f5d275a67922de528db0

  • SHA1

    f090c95a1d06573ed5f8981a11a1283e83337360

  • SHA256

    443f6403c50c6db947ccca88375b4486078749cabda932d452d267a8487bec98

  • SHA512

    798feaae98932c0d75ab1790f3c609857fd37da7c83ce3cfdba24c1a3b689a6a10e79eb3d70de9511f080cd875bbd0452ae0bc326902b67e0940a0aa757ed0de

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hfS/M:hfAIuZAIuYSMjoqtMHfhfqnM

Score
9/10

Malware Config

Signatures

  • Renames multiple (3177) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3bbd604cbb66f5d275a67922de528db0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\3bbd604cbb66f5d275a67922de528db0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1960

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1298544033-3225604241-2703760938-1000\desktop.ini.tmp
    Filesize

    110KB

    MD5

    eaf055b82b0d63687354ace0ee9a88da

    SHA1

    6a0a3cdd0caa65df3b1a52c0964a5356829d3184

    SHA256

    3271ef2f0e3ddeacb54f2718fe807e7ac2c99fb7b53f4a496cc082c7d6c27626

    SHA512

    26a346044a8e079e9099a47b306f0f555fa455521cf4c78deafccc80b48f1c84c75a4ae4b7c406859aad8bc6c1bc33f74012e114192bff300c05cf8999ff8d81

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    119KB

    MD5

    e5c803ebf25c28f32e377b05e21b1444

    SHA1

    b3b85b776c5799951d4268b67453c851f9422e85

    SHA256

    2b1841beb30c2ece0838748e1359874bb15c60860ea4897ec163a862565d76cf

    SHA512

    b07dea75a68d86e3a6e605bf3d8e32e2c3b9b90c8df18e0da894798fc6c6608d2720582b5eefdee497ee1fed73406897810ef4e51cabf1291f81e57402791652

  • memory/1960-0-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/1960-74-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB