Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 01:38

General

  • Target

    6f22e00d6112070c3f18dc872e33af30_NeikiAnalytics.exe

  • Size

    102KB

  • MD5

    6f22e00d6112070c3f18dc872e33af30

  • SHA1

    5087c24bfe1a60dd4e9396dafbdcdcd0fe276a66

  • SHA256

    d04e3ffbb999069b45a44ed7c2141998ba4d04473fe427f399ee01eb6b97eb4f

  • SHA512

    24233190ddb260578885f857a2018b72289ead0d473a8abe72d4e3df40c22a82ff9ce64dae5d6466e26f0372241d262a3fa07c89a8fc6ed43d8cc597b6e8e8bd

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hf2bv:hfAIuZAIuYSMjoqtMHfhf2bv

Score
9/10

Malware Config

Signatures

  • Renames multiple (3105) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f22e00d6112070c3f18dc872e33af30_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\6f22e00d6112070c3f18dc872e33af30_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2084

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3452737119-3959686427-228443150-1000\desktop.ini.tmp

    Filesize

    103KB

    MD5

    0b5ac3059785040cb3eb824bbc83dc7e

    SHA1

    07fa6008452a048af645d53970e27e8c0b9bf053

    SHA256

    eb91d6e85fa0777863ec0a9e9a1000f0934f7ff69c036a28a9fa0d39e68cec69

    SHA512

    d5366a36d6ef304bdbca951edb31244ebd42eace80d77029c7f610b0c23772d42890cf96251d4147cb06de9272707c0b45ba72c2be4e790928f28d0d9985a501

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    111KB

    MD5

    485e33501034c5d3da1948054189e375

    SHA1

    f8a50d2352cf8f242a06b8c8e1fd7ba24ebabea1

    SHA256

    26d973c0899861df00d18aa93aaa76cdd3c86566ef6496bdbb5b8c19b235d0cc

    SHA512

    cb1259486c83188dd257894ca1968e74bda340fb9193906eaed7c6d4a46ad8f4d292a6fd500be268dda8f6767df91bfe50bedf418754d347eb8a3fd47471f60f

  • memory/2084-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2084-74-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB