Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24-05-2024 19:09

General

  • Target

    1e50155393d82c96bce75edf846b5010_NeikiAnalytics.exe

  • Size

    61KB

  • MD5

    1e50155393d82c96bce75edf846b5010

  • SHA1

    55e164c517256fa487813dfb420128eb063ec2d3

  • SHA256

    af14488d2037efb2dcbb69bbdea90e08c9d23bdb84e60023794a08b612e70b72

  • SHA512

    e1520924e25f496d040b46a1f8bace6670c2dace49b581dc16ba374d7d560f673cd3e28780052439f9df8be8eeb4e580afd8f4a4b6e74473142c06e83da1e1e4

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZ1nKs6nKsD:+nyikUb

Score
9/10

Malware Config

Signatures

  • Renames multiple (3736) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1e50155393d82c96bce75edf846b5010_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\1e50155393d82c96bce75edf846b5010_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2868

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3452737119-3959686427-228443150-1000\desktop.ini.tmp
    Filesize

    61KB

    MD5

    850b919ce207446994af8cb096f639fa

    SHA1

    a0e20521adef62282331d4aa3947fae013045680

    SHA256

    dfb628fb90f389811969bbf91d3067ec0a851340104c6a6f136b506869c52dab

    SHA512

    f3653e8354cf4a75b167b8491c04d1d340b0a37703d8a1e7eba43bf3c329a9d1c79e53caaa22f0840136eab6b7e35936b5057931bfc348f60ad9b724e95ff163

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    70KB

    MD5

    c3167455ad5b7da47b97a428e8f4b356

    SHA1

    ff42c8da2694a48ca280b8339d4c483c8ca8244a

    SHA256

    a8b3aea6e04f10f8d7e06221cab4d1f8448d619983f7671ffa76fbf070939654

    SHA512

    e77ac531d8c9b1c01c8de40d6abbd769f4b19f8d57e931206a6582e79792150d73d0472f48ff2d8380239330cb1180bcb14bec3fd57ee3f1da2c7e6ce6656d4c

  • memory/2868-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/2868-652-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB