Analysis

  • max time kernel
    149s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25-05-2024 21:30

General

  • Target

    2159117c15db6fc39d50edff42fd4460_NeikiAnalytics.exe

  • Size

    71KB

  • MD5

    2159117c15db6fc39d50edff42fd4460

  • SHA1

    5d5448fe308a3a55d61ee1d9738e6ad30c1344cc

  • SHA256

    6a16b02e12b7976c8e185bc90c6f948a72a4fa3afcd43fcc6e856c45b21edce5

  • SHA512

    3d09497e315bcb9473fa03e28eae58fbda2a0f5fe651f0317e4e46e2e2ae3e2f005f196124b3f8221c5988d9544e80767b76e324061dd90a3162b2c4b6a7e52a

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8xJJMJJS:+nyiQSog

Score
9/10

Malware Config

Signatures

  • Renames multiple (3504) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2159117c15db6fc39d50edff42fd4460_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\2159117c15db6fc39d50edff42fd4460_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1660

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3452737119-3959686427-228443150-1000\desktop.ini.tmp

    Filesize

    72KB

    MD5

    0a56275693dda3b9ca84577a746ae657

    SHA1

    ddd96f71e676118a89e293b87ae229fb5a0feea1

    SHA256

    9fd63911523b8b585c2b9488d0aeea90df9aa09fb0e6ce38a720b27ea1261937

    SHA512

    079aacebfef97b0b65088a091b08c731cae133c90a25940c399fd8893a09eebe66b927a3fff315a3b92def9c69457e3dd703aec9d4187655bd5aef0e440375e4

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    81KB

    MD5

    0449e08d331e44406be1a7166edbdea8

    SHA1

    9426540bd44e917f0c4b62ccbddad9e5fa9fb7f2

    SHA256

    cff396e63bda92d7f4cb07a0f8829ad8ef2a693d3c076e28c87d0ede37c42d45

    SHA512

    1fee04d57f709931a05a04fecac1307dca89c03469200d504138cebc2904ef32cb08b8e46efa9e7c7f96e716543666444f68c01c49f233aa16e34a7f5b4216f2

  • memory/1660-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1660-656-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB