Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 16:29

General

  • Target

    208e464f4da4bb8e629e359b863577e0_NeikiAnalytics.exe

  • Size

    61KB

  • MD5

    208e464f4da4bb8e629e359b863577e0

  • SHA1

    61b7362a24400de1ab51ea0d3819c7c319465b15

  • SHA256

    873879199719b780363a734ee09b3531c5812cc6c3ac8cf282beab823d04da8b

  • SHA512

    be4e2a93ef6891df2f70ead1518feb8f7e6e48039a8cc9248d95593edb6aa0a706340cbe9f98b07677d20f96ef9374b961be1cffc0e1e37f79fc6c34f2399c21

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZBX5WX5oOf:+nyi4Mj

Score
9/10

Malware Config

Signatures

  • Renames multiple (723) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\208e464f4da4bb8e629e359b863577e0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\208e464f4da4bb8e629e359b863577e0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2172

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-330940541-141609230-1670313778-1000\desktop.ini.tmp
    Filesize

    61KB

    MD5

    06e87173c53ca5e78fa6dabceb2cbaff

    SHA1

    49e311afef1995e167a41381f94d67a7eda38025

    SHA256

    afa52c8ffdfcf4f26ecfded43542ce86700ee2fbd62bc25a6d7e42b09d5993b1

    SHA512

    a5230dc22907e0448fa594f547b16b20dc398ae83e83d63704d072bbe5a4cd35e45a4a0e8004d689d9b0b0fa424a96f75b195172757582a3d49d51ab369b354f

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    70KB

    MD5

    d4afbd113f9836013c233b2d4ade41d9

    SHA1

    dd64b65b1eebb7d78a3da8a22d6808554b7f6570

    SHA256

    3d42983fd8d4245979bcceb625352208569c02abca56185b088508b9ead7cf75

    SHA512

    1a9538aa5d4c3553cbf6aa65eeb63b05048293d2eff459046ee13b48a2fa598905dbddf925cc1d4cc13e20bdabe215db0dd7ac935692f25705fa7c58d54cf590

  • memory/2172-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/2172-68-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB