Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 02:19

General

  • Target

    76583e1cdbd91e7875edb4f0dff10160_NeikiAnalytics.exe

  • Size

    108KB

  • MD5

    76583e1cdbd91e7875edb4f0dff10160

  • SHA1

    777b030b8093f607b4a30e544a076322356a9f9b

  • SHA256

    6466008f4d5b3f986058342915109fc34175479c5cef260f807bcbbfaf090941

  • SHA512

    77ce49369bdf000c31c13313bc54614890f929952d4091e7ae2c3120b0578d675e38b45386b4611189e69fcb4fc4f35ac6283cca28864caaa81faed46cc6ce0c

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hfS/B:hfAIuZAIuYSMjoqtMHfhfqnB

Score
9/10

Malware Config

Signatures

  • Renames multiple (3436) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\76583e1cdbd91e7875edb4f0dff10160_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\76583e1cdbd91e7875edb4f0dff10160_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2952

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2297530677-1229052932-2803917579-1000\desktop.ini.tmp

    Filesize

    109KB

    MD5

    f2bdb63ea2a6bca71ae32bdeecca5fe6

    SHA1

    8ea685d9d0121f2ef3cc58c98e530ce1ae04a757

    SHA256

    c4eef8e7a542cede186a07a32f46ce26cfd07b14fb93bfa65f13f5ce97a56319

    SHA512

    b96d5bbf76a7fd454e13ed437be37a56c7939e3f84f2fff3a16e808f2a5c86df4a06e00ea39f11b23b5a8117267131a805fbcde8f90ff96eae383219358ba8cb

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    118KB

    MD5

    269ab9c28a868c5931c7754c346c652d

    SHA1

    7c25038a92743cc33cc7214dd65d2da8a24626ec

    SHA256

    d085ce640981412e28e42f74296670bf71aad6fecee1c1942a715338cee4ddb1

    SHA512

    58f998ab7b94c58fa875b591b1735aa223756a9d980f1d72dc355b5f2213c6dd565b1ef9795fcc87862e1b901169146399ecdd6ba57c68c85cbb8d77e88aff26

  • memory/2952-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2952-76-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB