Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    24-05-2024 14:35

General

  • Target

    e6bb5b09362117d0bcd8e449f1e2c040_NeikiAnalytics.exe

  • Size

    54KB

  • MD5

    e6bb5b09362117d0bcd8e449f1e2c040

  • SHA1

    ffa8e510db8bff61be97def0cf94eb96a6bf1835

  • SHA256

    fd264f97a6a1a7217a80560729f1d540de7b5ea1b3e5ccc6da95eb5e53cf354f

  • SHA512

    c819760f1bd5b5aed4b621fe8172a1c6e72d9156034d7297becd4fefe51c4f9b85694cacffb0eef130da9516ee538e80c175d4d62b893f6e493bf0aef007a025

  • SSDEEP

    1536:CTWn1++PJHJXA/OsIZfzc3/Q8yi+iyCiym:KQSoLiyCiym

Score
9/10

Malware Config

Signatures

  • Renames multiple (3738) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e6bb5b09362117d0bcd8e449f1e2c040_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\e6bb5b09362117d0bcd8e449f1e2c040_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2236

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-481678230-3773327859-3495911762-1000\desktop.ini.tmp

    Filesize

    55KB

    MD5

    8fb4bc0cc6732441da4f6491320ba1c6

    SHA1

    12b04ea13c8ecd733b416896a556b1de6f6ad1c0

    SHA256

    970b9046db7350ffd1d4d49c4e8c740431c5ba09105fd6b878e4f7df596bf1cd

    SHA512

    d599b7cc9c2d79490032e81e1d9cdb18c0e736bbaab6961def6f61ef7f12cb06d12f34b389b022d8b3d9b891d9a3764fc2880f258b6996750be1a23ed1514d5b

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    63KB

    MD5

    967d4fb7dd749396ee88b9d9602ada9e

    SHA1

    f35307902a2c88e731b854556d824368a83127c2

    SHA256

    d6b5a4e182eedffb344e97f83b6df72fe0bd2923b7f19e7333dc2c5190a70ae2

    SHA512

    c50b96e63497424e71dec01e20e90c1e93c33c9dd6dedfcc99bce5d631d7577c2c7128aaf665cb91fd2994a231ec85ad169aca3b317115348d31df41cc19fb69

  • memory/2236-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2236-86-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB