Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24-05-2024 16:57

General

  • Target

    396d3509ede3a9070a0a2a8928f29230_NeikiAnalytics.exe

  • Size

    72KB

  • MD5

    396d3509ede3a9070a0a2a8928f29230

  • SHA1

    3b668ce88c0962d779bed6b344202a6cc7203c00

  • SHA256

    8e5d5877d745743390e29d2f7059a021be00e66a08e540db4006c1465d9d4a63

  • SHA512

    9dbc551461617193d41052ef91e2e1bad195e4e81aaadceb1736d4614d2082e1b6ca124691fb37d8cf49016e1bb386c8da7dc5872b039bb55f762b8b0e3511bf

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8xJJMJJ5Jb1JbO:+nyiQSo0

Score
9/10

Malware Config

Signatures

  • Renames multiple (3492) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\396d3509ede3a9070a0a2a8928f29230_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\396d3509ede3a9070a0a2a8928f29230_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2968

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2297530677-1229052932-2803917579-1000\desktop.ini.tmp

    Filesize

    72KB

    MD5

    771f57ac1dd3f135b23d540e88e7f8dd

    SHA1

    9417ee916d7e8e39749d117d205999ee608eb71b

    SHA256

    e9351e334a715b6a135ca55a08d0f177f2c82615e18fe4fe50d444717e340f1d

    SHA512

    953a52b6a6a3b2a5060952e7774b43e9d9169f3ac16dcbf6c32f0e1b77e25a088591aa9a7fc6c5d69f4595f195556acbad77f02ec8741a40cab7c5187ce43803

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    81KB

    MD5

    607da5502ebeb4574f3fa4292dc9740e

    SHA1

    44e96d3e6224019af381617a8c738ff34f5a388d

    SHA256

    c94c82df6e3053254701537c7591602104f2d95e7c2e9d824926533c2e0a2187

    SHA512

    e2b878dd89145dd1456ebda88e5fa2f080feec5743cb9162b1d4c6b249105bac0e8ba8085f5154ebf493cfdb90d37912c71a8c10660be629036dac4020b6485f

  • memory/2968-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2968-650-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB