Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 20:43

General

  • Target

    84b6613b6d8176175c188a2030170530_NeikiAnalytics.exe

  • Size

    125KB

  • MD5

    84b6613b6d8176175c188a2030170530

  • SHA1

    0105fd973a2671aa8a57cfc954d67a5ef8ddd47e

  • SHA256

    ab304a269fcb1c119329a9e178170af268a19d7b56e1352de7f4c9c830f9dce8

  • SHA512

    855209bdf12730838390e87bf060616a808a91f2255c916ed49ff4f0b9d4ddab0bee9873c9ffa30b54caa99608ff0876d2f7f239906bd4751e0d10164e84459f

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8yiATWn1++PJHJXA/OsIZfzc3/Q8yiIZR:+nyiQSolQSotZR

Score
9/10

Malware Config

Signatures

  • Renames multiple (514) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\84b6613b6d8176175c188a2030170530_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\84b6613b6d8176175c188a2030170530_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2696

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-330940541-141609230-1670313778-1000\desktop.ini.tmp
    Filesize

    126KB

    MD5

    9f99e1b3214343c7bb1dd5eece34639e

    SHA1

    f3bbdff2b93a4d521233c1a6ccf7abdbcdc3a211

    SHA256

    56c597140ee42853ce13600ec7b8f379cb3a66d8c3e68d2347ac58f9b26a8242

    SHA512

    a78574aab9f3418957adcc10835b0eca56b42cfd9f1bc4f76ea6ba340906149d3964496d8b76eeed0bed88f112d0f2d5aa7014b819211062a38d625e6011789b

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    134KB

    MD5

    a1a6b184ec7584c48c1a3645c8980a76

    SHA1

    b87ab9c0dcbc2ad182889513d980e205e73fd382

    SHA256

    df87c067f4937dfac8041ad1869248eb681ca36cff1f17aeae0252d533e0425d

    SHA512

    9182d69775aa82b260ce0435b933c67e0b2e3b9aaebfff96de883238502963606e25c3e50faf1aad1774232ead562beed2bfc1cec8c33c12687f1f252ff3d5d5

  • memory/2696-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/2696-70-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB