Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24-05-2024 04:07

General

  • Target

    a30658a84715a080686303f599b81610_NeikiAnalytics.exe

  • Size

    68KB

  • MD5

    a30658a84715a080686303f599b81610

  • SHA1

    dce33f81a6599b154811c34629ba0ce6299a86c8

  • SHA256

    d9bf8817d81f51c9f5143ba6a277fc18ab889529b52d4245386ffea5ef325d70

  • SHA512

    eb61d3c6fde7d7c9956f3d7ec76ea56fe6b282324461cf2ba3233a9cf61a8d081f510c7b0b679c5b17e8ba8e5654878e43458162da21f302730bff2a787de1b8

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZnzffGFypl8:+nyiEGFypW

Score
9/10

Malware Config

Signatures

  • Renames multiple (3447) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a30658a84715a080686303f599b81610_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\a30658a84715a080686303f599b81610_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2212

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1298544033-3225604241-2703760938-1000\desktop.ini.tmp
    Filesize

    68KB

    MD5

    7407d6053f25b09b893a029318752722

    SHA1

    b58b080b625f13d60e468aab463c7f41acb86543

    SHA256

    e25547036feb3ea63886098729726d4113a47387851df979a22043092cbc24be

    SHA512

    6be49354b39c0acb9c2980552e207ef6f5b8c4df1a359e48a97aa0d07356d4b396374abcf4f9cec69617f4ee1ecd5affaa3956c9fbac399d48107e0e645bbcaa

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    77KB

    MD5

    2f2c7f5fbfdf5381d5c2b0e56160e8de

    SHA1

    49f755c50cbeef0b7d1f6efe64d33e040e10d71c

    SHA256

    6aef2a5a9203f68d830b5fddd4ec26b9e95f2266a6d1f55e3af92ab552a00295

    SHA512

    d1c33d248bca83be07e8b916b316f275ee8961092e466520ef17f31858664e04be67b5c22bf8e0f847ceaabde0bb0073a621c0b08adb9a0151a27f7ab598bfd4

  • memory/2212-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/2212-450-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB