Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 01:48

General

  • Target

    7126c9397a8722cc200418bf96388720_NeikiAnalytics.exe

  • Size

    57KB

  • MD5

    7126c9397a8722cc200418bf96388720

  • SHA1

    ca9ffd03d75f05d14c72aa0b6204e977620f3e08

  • SHA256

    31b9403b9e4211d3c67b00deaea4248888ffd38cde760101b711ebf708bed219

  • SHA512

    bd9767a79e1ce76e698a1615af521c722c163dd496ddbc78800c6619f3300da3d72d46985c20008e6fad3a4d02d4a56674356c6d580c616d5bb9e957ba5184ac

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2bTgT7v2r:CTWn1++PJHJXA/OsIZfzc3/QbU/+

Score
9/10

Malware Config

Signatures

  • Renames multiple (3436) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7126c9397a8722cc200418bf96388720_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\7126c9397a8722cc200418bf96388720_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2964

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2297530677-1229052932-2803917579-1000\desktop.ini.tmp

    Filesize

    57KB

    MD5

    c22c0bfad339702a31524523fe605bbc

    SHA1

    d9743975f7862e6907ddb63342c9223a68b81461

    SHA256

    f62b967591768336ad4488b00d4300f5b61a09128735acc949c8bdfd7b9c6f19

    SHA512

    230dc3fbacc3cd8beb071d75bce323764ae3c8305315fbc4167a90e20a710de4b98454e5c48c71fb8af1e11654181d92a5e57b5a283d581f28eba70033104ebc

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    66KB

    MD5

    f8013e67a9a48ae38e5888296aa49344

    SHA1

    c63fc0abcd1fb8a60560ea8d8c8c94e0e408d8ae

    SHA256

    44b6597478319f5c668c6c9a4bef0a31a1b9ce34f24d65de44bc476c9bc1748c

    SHA512

    0be75600fe3c75daf7f0362f1d9212d2b91081a95fb316a6eb002fa34b76b17cf7321ccc0fb39ce72db6a5386f42096196887f4cb0864485b0c85e589f90eca5

  • memory/2964-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2964-74-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB