Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 15:33

General

  • Target

    ac9bf9f0018ec833aaae8269bcf33a10_NeikiAnalytics.exe

  • Size

    62KB

  • MD5

    ac9bf9f0018ec833aaae8269bcf33a10

  • SHA1

    382c07667371bc27791793ecbe208c0f59a9c29a

  • SHA256

    b81f3377b6a139ac064f7316451545d08ad580f3bf812ce7b0f83263b10e372b

  • SHA512

    0018cc8c584110a76cec2ec3e4a28eec375e54b43b0c046927c8fdc1a705ab99cd5cb9661830ab36f93a1a3771ce399f04235efeb6c982b266133a861a7f92c5

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q83:+nyiQSog

Score
9/10

Malware Config

Signatures

  • Renames multiple (3664) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ac9bf9f0018ec833aaae8269bcf33a10_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\ac9bf9f0018ec833aaae8269bcf33a10_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2156

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1298544033-3225604241-2703760938-1000\desktop.ini.tmp
    Filesize

    62KB

    MD5

    805a9cff8b9346da63df8decc1849b41

    SHA1

    cae631aafecbab819783cb74f64e222a8e7d70f9

    SHA256

    1745b62a57eb9a27daad9aca69bef7ee0536016ab7bd035c9dc403f5decef86c

    SHA512

    e609121c2deba9f23025e1b3ef6f8ef6c5d70fae88028dae1085433128630c58db70db9f6540278546667098479511bdbb129fb9dd93a2c5449e61472285b4df

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    71KB

    MD5

    f78d6e159904ac6cbe656ffe79d121d5

    SHA1

    76586c211b23ea9ad32d2f13445d6937d6d602ae

    SHA256

    63dc3256642321bf761c9adbcc8252034625409815ea40f963d2b19c3c2d6076

    SHA512

    2a6573b6fdd0d3c9bab11a791df721eb4b93c1e6eeb0141603a638b4c91403bcac07f1645fe61efd5bf4679f989068314f19ab2eda9f0cc0f3407921885df5a0

  • memory/2156-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/2156-648-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB