Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 01:40

General

  • Target

    6f89d151140c69ef3c3b2fc2a12c4be0_NeikiAnalytics.exe

  • Size

    101KB

  • MD5

    6f89d151140c69ef3c3b2fc2a12c4be0

  • SHA1

    aadba4131f312d482fcb6c6666e35b00274c012e

  • SHA256

    17d9298ffa8f60105810df7a4d07d40a1359e4d52ad57f525873d5ab55bed48f

  • SHA512

    5656cd1b8884c887029d6efb1577878ff7c22d398a805145439ad9b467e82c4fad2e78b8d0618a6f92822cf5836d734dbaeb159db2186fdf25aa354b66fda22c

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hf5SP:hfAIuZAIuYSMjoqtMHfhf5SskD

Score
9/10

Malware Config

Signatures

  • Renames multiple (3440) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f89d151140c69ef3c3b2fc2a12c4be0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\6f89d151140c69ef3c3b2fc2a12c4be0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2256

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2248906074-2862704502-246302768-1000\desktop.ini.tmp

    Filesize

    101KB

    MD5

    275d2eb9bb99d5cd33898a8820020cd9

    SHA1

    7bcd5dace91ce353a6c6143d82580935dae79509

    SHA256

    1471996800e56a9307707be2e0e04de9a44404b50954853f4cb3e688dbdafbe3

    SHA512

    0806afa527b6475cf39b72ee34d9ca9e4dd0cbac653d43f5305f320cf1e878c03436313e0e3a00eda74ffc057e8e971c611d034bc365897de76fd9198653f768

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    110KB

    MD5

    e7ba89829b0114ab9c46d06ea4dffc55

    SHA1

    81f8c02e8867ea26110993a4154b0f2e722c12ec

    SHA256

    79a3da33fa35ee1756dd90b45ffca025cca2505fa9dbaf06d37406704d01150a

    SHA512

    026bc9e3e111085cf458886ff63c2ca52b9e266af9ec8ec19d696bd06a807fb58de48d00d601add23ae14beb1af55853e729a3dd395d2685eaf19a22e8b5bce9

  • memory/2256-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2256-74-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB