Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24-05-2024 04:14

General

  • Target

    a43f475bb4e2124ef957503860f581c0_NeikiAnalytics.exe

  • Size

    109KB

  • MD5

    a43f475bb4e2124ef957503860f581c0

  • SHA1

    0b92bbb4bb6ab49a2d565d20003dff421cf178eb

  • SHA256

    17c9432aa8362cf18c800ab7f3dfe6b9ea7c40d8ea954f8cd9c850e26c386b9a

  • SHA512

    bf6f51ceaeb1a253308d9524eb85fd5fdbf2acc39c454426d7de6f246d0c5435e327dacaab7d1a4f3a12f389d484454c9f1ad158bc229df893eaa473c4c6f7f5

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hf5S8:hfAIuZAIuYSMjoqtMHfhf5SskQ

Score
9/10

Malware Config

Signatures

  • Renames multiple (561) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a43f475bb4e2124ef957503860f581c0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\a43f475bb4e2124ef957503860f581c0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1500

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-330940541-141609230-1670313778-1000\desktop.ini.tmp
    Filesize

    110KB

    MD5

    7a87dbb057472fd9296208a63d237c77

    SHA1

    760a57b4130992e2b69642456797a62da848c0cd

    SHA256

    b18d9b5f500d201350373b78cb2fba6604d5150920c67e7d2fa126a3e917c595

    SHA512

    a1e4a576d2726376e920ae452f9533a649e4bf1c0a90285da2a7fa7f3409dbaa5ef33d9452c22c938e6d2208f6e9690916c7d22b6876937969a67568022395f4

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    119KB

    MD5

    02b2914dc4abdf7c83df379893ea2293

    SHA1

    57ddcecefc9a97ccb557f2bc1c8792ba64f932ee

    SHA256

    06df91651b07ba798a553c2ba5dd0b8bd0723b2d24f31a2dbffb04b4bfda8cd3

    SHA512

    c58cfeff97b1eaccf20a7d8a95c9722b8bc2ed9cf82936b6cf7bcac956c52f07cf16ee1a003d6250f8125b91215beac4bca069d533399dd77a81e0fa98dd1d35

  • memory/1500-0-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/1500-26-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB