Analysis

  • max time kernel
    149s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    24-05-2024 04:26

General

  • Target

    a6d31eb5962b2e7def445f586297c660_NeikiAnalytics.exe

  • Size

    42KB

  • MD5

    a6d31eb5962b2e7def445f586297c660

  • SHA1

    4d824cefd38ce3d84fa5642be4548e387cc2b479

  • SHA256

    9255af14979106e2c0c2eecac672b5bb8e6b070e3af780589b5eee275ac8bf4d

  • SHA512

    2822f266c117fca0399ba91ce334a40f177cd8b13df0017f39cc8a01c8b0820a717edd7263ac3b4f9f73ba3bc817173e9b636fcb237d2ffef590cf791c75af28

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFS1:CTWn1++PJHJXA/OsIZfzc3/Q8S4Z4x

Score
9/10

Malware Config

Signatures

  • Renames multiple (3789) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a6d31eb5962b2e7def445f586297c660_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\a6d31eb5962b2e7def445f586297c660_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:492

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2737914667-933161113-3798636211-1000\desktop.ini.tmp

    Filesize

    42KB

    MD5

    b5507a81aed447f379e927308e594223

    SHA1

    50393ce160c1263a3b89f1f340222ea4c9219e82

    SHA256

    b9b7746a21c5b797e1d2a8cd713f13333dd5854bb295062f6b0fb991b2e87435

    SHA512

    eb960c1848d3da0b7f12544e109c0fe445076dbb43f527eac88ccbbb99284774c1704ec358e29eb74bdbe7649650bf5a232a7600d3b4053f99781b1b67e9323f

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    51KB

    MD5

    f3aa22ccaa58d3a9974e32f7bd78b1b6

    SHA1

    36be50ab3cfbd0ff6ba5741a8c0bb178c1ab3760

    SHA256

    2352a7a76ea1ad42332fe7a17192cfbea876916ea504c7099ebad6214854c73a

    SHA512

    e5b26d84e00d17e09749ccc398887fb9fa538c7f8e31071bafc0dfca0af4658421a052532dda99426dd76b29abc3783df912ad38a6fd5b7385f6cd30bdf6aa67

  • memory/492-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/492-78-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB