Analysis

  • max time kernel
    150s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24-05-2024 19:05

General

  • Target

    13fcf923e536aa8367288a21507710f0_NeikiAnalytics.exe

  • Size

    64KB

  • MD5

    13fcf923e536aa8367288a21507710f0

  • SHA1

    47d2f886769cea08a4d5cdc7dbbfac94254f9b5f

  • SHA256

    0d915dddbbecb3362fadf9a3834011096294767752021a13b0d145a8b3da5294

  • SHA512

    af6e27bcd86813f43d935527b259d0e2a52cc6189b82faf687d5ae19a7500858bd360bffd415f03cf4694d43e36ff1a05b9690bd44e311a17eb5376ee5bdc3ed

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8c9H:+nyiQSoB

Score
9/10

Malware Config

Signatures

  • Renames multiple (926) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\13fcf923e536aa8367288a21507710f0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\13fcf923e536aa8367288a21507710f0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2888

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-330940541-141609230-1670313778-1000\desktop.ini.tmp
    Filesize

    64KB

    MD5

    109010cc392e9906acf18661dd4f4279

    SHA1

    76d055218ac1fb822cd32e8736e9efe6f3e442f0

    SHA256

    264049dbb880f02b87929dc06e7fc5057a406e9c13e3500e26b0b166a3a6453d

    SHA512

    5b8060a0254bc1c53c20c1ac4c6401acd265531d77f2322450f95bff54e011c53b727184bfda965697459030aaea1b6a2a0d5d5f7548d25d841477eef3c516fc

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    73KB

    MD5

    6cf0dd6603ea6b7f529eb7821d08e2cd

    SHA1

    0f92db648e0d3e8c2ee6baa18a90c824230f05ed

    SHA256

    a9859b69a4d7a090cb4e9c345ec57f7915fe922443236b6e33b443b856a22456

    SHA512

    0c8c09d54b2e5990cb7506303c0799da1f3bd54029469ba45633d2e60f273573e5ecc2a1b5fee287fb3cdc0242c8a5ba72769ed4154fdfa33096267c3be2d6ab

  • memory/2888-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/2888-68-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB