Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    25-05-2024 23:58

General

  • Target

    3a7908a27f70ac1d6a3503a024d648e0_NeikiAnalytics.exe

  • Size

    53KB

  • MD5

    3a7908a27f70ac1d6a3503a024d648e0

  • SHA1

    f633df7a4729a3871f94c0b52b4c6254346e981a

  • SHA256

    78e2b9d6cb2d87305409bacaf361df6d25108331d8e75a952cd9c3eca67a4768

  • SHA512

    d8ac942b7d954cfad260eb024a3508cbc6e84b3862169d9cd6cd66ef396c981a0052371737db0f695d60081e8ccc7ac1a77b2ef87da83732f0e066f8644deebd

  • SSDEEP

    1536:CTWn1++PJHJXA/OsIZfzc3/Q8yiuaa1aaZ:KQSo1aa1aaZ

Score
9/10

Malware Config

Signatures

  • Renames multiple (3460) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a7908a27f70ac1d6a3503a024d648e0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\3a7908a27f70ac1d6a3503a024d648e0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1992

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2721934792-624042501-2768869379-1000\desktop.ini.tmp
    Filesize

    54KB

    MD5

    94513ed483d0d1cdadb30a2c0672c36f

    SHA1

    a63bce853c078f67dd0b474c4f252f2ea71945f9

    SHA256

    7d80130ca66ffd8d4c5f654db25d909a2732bc04e6f735817d951e9f4ca17381

    SHA512

    a5ad9f430fb755119599df615b449c0739a882e4d7da0b78874b44ae7fcd0d806226cc771724e09a6feebcf58fe7aa4f4abb7e6f6929799f86d3a2ddddb56b01

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    63KB

    MD5

    44dc2a6983ceec23f4998762bfb9b092

    SHA1

    e3d383356c8b18aa5e3107e59025c6289c902458

    SHA256

    a19a6eb23197eed6ac60863d4615fabc1f485ddd996fd3cfc80e36c5e4ccb857

    SHA512

    a087245c421a8d3d3efbe89e63899026a81bcfe6069b549b4901ac35415d24789686a433716316ac95dc4658e8cd8da22f48cdefa8bf56b66686dbc63618685a

  • memory/1992-0-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/1992-76-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB