Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 00:30

General

  • Target

    626b91fd2086bb53ef50c066cb4f1f10_NeikiAnalytics.exe

  • Size

    104KB

  • MD5

    626b91fd2086bb53ef50c066cb4f1f10

  • SHA1

    39bf2388dfd73fd5d1a92b5c390fe69ccc809a19

  • SHA256

    646a6b5b4a54a64226e575f20cc43740f13fb32211e8aa01418324af273a20f2

  • SHA512

    eecc477d072980c9dcda7e5cddd8a2fea8f1dca805afbe64bb39798d89cd5cab350e50936a9af7e89e14e3b406f07df9d4e4c08622bbc701f8356027ea16f421

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hf0xF:hfAIuZAIuYSMjoqtMHfhfM

Score
9/10

Malware Config

Signatures

  • Renames multiple (3427) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\626b91fd2086bb53ef50c066cb4f1f10_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\626b91fd2086bb53ef50c066cb4f1f10_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2356

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2248906074-2862704502-246302768-1000\desktop.ini.tmp

    Filesize

    104KB

    MD5

    9c3c25f27560a1b859ea088f56a4b296

    SHA1

    98dff51f6d0506ed12cb81ecc31e8fc52c3e1d2c

    SHA256

    f2ff44ae2fceb9d51961f376a7d9aa977e4ef10e77e8265b106973a87e7e0599

    SHA512

    e9759ca7a9b36dda570fc3dd3044e6692ce2cc4eb788c5f8f0f47edbd5f6678f90aa62e71456ff37b4c170a42e12f427e98f71c6ad28d7cece8ab04eed07ccfa

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    113KB

    MD5

    f991d74be5266ef24754cb28fb4ca846

    SHA1

    02b207a9c9f63202e814342c3cca0c1b7f805721

    SHA256

    cc1699ed1eabc366c1c48e0447c5aa788d66faa425dd834ce546fd0f70499159

    SHA512

    33643ed6b0d4ce1ec7ee803c5f7bfe7f86172a245d0b0d6581ba9828d32f0b3f558d2755613027fd18013101a5962f1dc6313be0db45b247c9f2bdabe4d71035

  • memory/2356-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2356-76-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB