Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    24-05-2024 04:21

General

  • Target

    a6047aa8c76a048396a45f6f8bf93770_NeikiAnalytics.exe

  • Size

    122KB

  • MD5

    a6047aa8c76a048396a45f6f8bf93770

  • SHA1

    e9719c9e73eeaa2027b3e59feac40f378d6faa19

  • SHA256

    7acb12e93fd4b4415f98153d40f1a0c904fad57fdc5c09627aeda6a03b63af94

  • SHA512

    04f6ecc1ddf842848f56091afd290b183affadf6ea6bbd7fb1a9691dfa85de112da435233968416cfaf9ff8d4fdbc9eea488c1c11d4606b0a49119d54c451ca3

  • SSDEEP

    1536:67Zf/FAlsM1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCf:+nymCAIuZAIuYSMjoqtMHfhf6

Score
9/10

Malware Config

Signatures

  • Renames multiple (3426) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a6047aa8c76a048396a45f6f8bf93770_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\a6047aa8c76a048396a45f6f8bf93770_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2004

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2721934792-624042501-2768869379-1000\desktop.ini.tmp

    Filesize

    122KB

    MD5

    432b870537f0f3a9702d56714d6952a3

    SHA1

    3df285945786a0e23bffa17536f50d8398572e46

    SHA256

    a4b1a48ed0777330f0ed9f338b1c4c6745a0e486d1e80733635a6967770cf7c4

    SHA512

    3e2b10d9b8b73fd9d05574e1c274c90f076dca3c3e6007532155b9b5187a50a533154d6be8adeb0ede396b4993a6f0d872e89e20e55c7722a7c5ea86204178e8

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    131KB

    MD5

    889aafc8bce841f1a724c7e69af0ed37

    SHA1

    8fe77f9e30dc044dbbe4b11ffeed24840cecfe71

    SHA256

    7b712200f6e3eb80787e53629a3c9551a8c72b12e6c6da4f23fadbb23218af4c

    SHA512

    5366b2e039f17fb25dba5b1a9cf169dfab7bb55522d099218b718da755559a8b404446caa94a6b2ad99c0653ae7abedf25a685d395d8c350b47a4ab69b7e027b

  • memory/2004-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2004-600-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB