Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25-05-2024 06:18

General

  • Target

    7342fd9fb34dfad1d7e616fd42140060_NeikiAnalytics.exe

  • Size

    103KB

  • MD5

    7342fd9fb34dfad1d7e616fd42140060

  • SHA1

    0247c7d85c43e9cd6fb05c069f25b59479f1f4b8

  • SHA256

    f6c7db0dfbdd98c284e3c5f4eadc2475939f0274f0c52e554bae4d960b6ccdd2

  • SHA512

    6914d4e93e0b1e63924f8d7b1fe2b87647d1a6e6a04cc50e94112ab857caeb33938562cad0f69348338b95cf16828be9d2befb4edb9072702f5c65b3b38624e9

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q89TWn1++PJHJXA/OsIZfzc3/Q8/:+nyiQSo+QSos

Score
9/10

Malware Config

Signatures

  • Renames multiple (3305) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7342fd9fb34dfad1d7e616fd42140060_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\7342fd9fb34dfad1d7e616fd42140060_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:3060

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3627615824-4061627003-3019543961-1000\desktop.ini.tmp
    Filesize

    104KB

    MD5

    9087e57808748f9c0dae68eb65833222

    SHA1

    358569b7538d87fb1774b92097c236a6af6bcfd6

    SHA256

    83999ddfb685270c790c753b5807d14e09e647b1173ecda456220743e5ce5698

    SHA512

    65512b186066e028100b3e9c99741f778f3353db8dd94827970c3007879c681b7c5fafcd983d71164a28389a164d26e84c7c900c19cad6de6838595635a2a2af

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    113KB

    MD5

    5d47d0bde06a657f2e99e6329c3444ed

    SHA1

    3156ff0eb87ec8cf622489edaeb714bc4b3ba19f

    SHA256

    3a9363f1aba8e4325b8c7dff12ddc548b5b07956e5010e167d519d78354aa4c7

    SHA512

    49346ec7745170bca7b69a66ebb422b422624595e5257a2c4b44bd59abe63562b42629ee89da29b6755c89364d9ff82986cc54150b3e2c9373a9c9761cfa66a9

  • memory/3060-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/3060-564-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB