Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 00:03

General

  • Target

    5e07c1c682a0ae48db70bfc6dd9b1a60_NeikiAnalytics.exe

  • Size

    68KB

  • MD5

    5e07c1c682a0ae48db70bfc6dd9b1a60

  • SHA1

    aec64fcad5d824bf15374851720eb36a61970ffd

  • SHA256

    c360195c35d128eee463b250430674b992bf78ed56d9d734feabc10c1fbbab85

  • SHA512

    502798a1b19729e43cb73f0cdd12c3ff1d4b543a178da166bd06aebdee194299d15ad7b0b1a577666d3b68b8c2ffd634da29f6ea08dc8cc8600e3f24d7135f37

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8asUsnr8:+nyiQSohsUsnr8

Score
9/10

Malware Config

Signatures

  • Renames multiple (3427) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5e07c1c682a0ae48db70bfc6dd9b1a60_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\5e07c1c682a0ae48db70bfc6dd9b1a60_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1460

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1298544033-3225604241-2703760938-1000\desktop.ini.tmp
    Filesize

    68KB

    MD5

    d28e58517e3482412331481490854c41

    SHA1

    46dc02404df4fd5471b8d0f5123c295dec7fd176

    SHA256

    055a4e9be5868538dfec9dffb146530044c3bd0dffc7ddbd1c4b54219b48ae28

    SHA512

    53c4e968e15d8ac610d54b8f3bd5d47cc221524872d5ae42d66230c142f503c9b72b5f769d693444b324d6883673886fe0d6c2cee94b29641f894c34ad4ee191

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    77KB

    MD5

    9bfdc6faf02d2469fbb6313e7938436a

    SHA1

    0caa27cd162e4686c36ca71a1128b1d023aafc10

    SHA256

    08c22ebfd222cc6d73d42725946bb1dc6918522f38502c0e14739ffaaa38274b

    SHA512

    2003147fad75f7c6ce2fbc3fa452418560cb7f552aa0d0a91bce0032dda6e294b0ab29928b1046113b079bd2b0c73476c41cf92ef6b763bca5e0d82b03bc96f0

  • memory/1460-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/1460-642-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB