Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 01:34

General

  • Target

    6e8b2a4ddadfc0ab1f8df7bec439bc70_NeikiAnalytics.exe

  • Size

    138KB

  • MD5

    6e8b2a4ddadfc0ab1f8df7bec439bc70

  • SHA1

    309232af5c436597f6ea748b52bfa6cf19d252fb

  • SHA256

    ad166190d90cf3f3398a2773d1321825b5f0107164069f557ccdfd2c9dfb9b5b

  • SHA512

    0615427552afeecb56b56a88185ac58b7db9362acc89ac5e61c1988484105b39003497118bafb6dc08480784262efeb9c9ba42239f518b55096126753ef3bb94

  • SSDEEP

    1536:V7Zf/FAlsM1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCE:fnymCAIuZAIuYSMjoqtMHfhfvF

Score
9/10

Malware Config

Signatures

  • Renames multiple (3443) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6e8b2a4ddadfc0ab1f8df7bec439bc70_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\6e8b2a4ddadfc0ab1f8df7bec439bc70_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2424

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-481678230-3773327859-3495911762-1000\desktop.ini.tmp
    Filesize

    138KB

    MD5

    68db6fc9d33324e8e30f80c5a3db1764

    SHA1

    53ba246b816ad3a91f01a184cf794e183c54a65a

    SHA256

    4fb0fc69bb9ba04acfa0368db77c7b615645b676e3b093049c6c31f716d6d73a

    SHA512

    d35f1d88feb5028df96ed956cf87fa027c78d5d79e2216a78b799bba7e2ba89105b3901f59d100bbf3c90490366105d005f2d29579d309c62a3d9a33eb7383cf

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    147KB

    MD5

    6743a68ae21ed870b6c7ed5e67a580f4

    SHA1

    96c6d94a01bf6501179a1a5f4e3dcf7c83d578a4

    SHA256

    02eb100ff76ee172c4f17238c1eb11e0cf4189895173bc282e3391ca4b131397

    SHA512

    3d83e54ad53819407bbfa53a46d042599a14ba4ad4432c8f297dd11706248fa49b321caec0fd90811231710e2020bfe9897a8caccbf773ce8c5a3f7636b63537

  • memory/2424-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/2424-534-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB