Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 21:59

General

  • Target

    93d6a7722c42bb0d781d9e608bafd690_NeikiAnalytics.exe

  • Size

    51KB

  • MD5

    93d6a7722c42bb0d781d9e608bafd690

  • SHA1

    102e4291e004753052b1056a6a2ab52485099acb

  • SHA256

    10c5d2881d467879fb3878014366fcecbdb446de3343e39025e1105a79b8a039

  • SHA512

    a4d6717ac83f05c7ac3534b3175078f888bf872da14961ea821bd2fd350c8f23526939c1b3d8473656ccb4d6cc6d9413513f1abcf0b5422afef8fde18145e9ea

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFF0:CTWn1++PJHJXA/OsIZfzc3/Q8yiA

Score
9/10

Malware Config

Signatures

  • Renames multiple (3769) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\93d6a7722c42bb0d781d9e608bafd690_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\93d6a7722c42bb0d781d9e608bafd690_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2352

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2248906074-2862704502-246302768-1000\desktop.ini.tmp

    Filesize

    52KB

    MD5

    e932fe185f41f84a9809c8efa1d39c64

    SHA1

    8396584f6c8e631ba2d431fd1bb1296030fb2ac1

    SHA256

    796ec2f822d24912a5bebd0884ad33944937f4d078cbdba5f35b6b2e42fc18a9

    SHA512

    3f78983726b727791fbfdb7eb98ebb632526e46b2be2e04b011fbd46ed5d8d040bda57155b2c91a6b3a7ada0752d27d0b85e55583e3837c011f44b8b780976c2

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    61KB

    MD5

    6c4fc9b27323352b365bad624a925e42

    SHA1

    32738428a4ceef985a7e175c7155fa0554f9284e

    SHA256

    45087778b565cea6fe8f174c9df0571c549609f25de9b9542ccbc3a18b7b7389

    SHA512

    42abb8d5725f93b7a2a3e744d6964a0d7b0bf979b35f79f7f6f1053d5c738ce1fd2a415bc56ac6f2fc43ece4dbfbe008071a6c091fb49b6b4661ced534e815bc

  • memory/2352-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2352-86-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB