Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    25-05-2024 12:53

General

  • Target

    71e95b4887e48bf8e20c026240fcbb40_NeikiAnalytics.exe

  • Size

    72KB

  • MD5

    71e95b4887e48bf8e20c026240fcbb40

  • SHA1

    4cf733e07dce2d9be7a9ec15672aad6d86dfdd11

  • SHA256

    0b964c6fccc270dd805b4a8a9a4988c0d0c7ca458cb55e4b617134f76b4f126f

  • SHA512

    c20e1a8fbbff796fe9a5d03ebaa29efd4c220027ba8c1675d02ac3cce8b7b6a848cbeae0d3a0db6b998bbc95b6fb40051600acee93015fb209831058c3ffa813

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8xJJMJJP:+nyiQSop

Score
9/10

Malware Config

Signatures

  • Renames multiple (3650) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\71e95b4887e48bf8e20c026240fcbb40_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\71e95b4887e48bf8e20c026240fcbb40_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2204

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-481678230-3773327859-3495911762-1000\desktop.ini.tmp
    Filesize

    72KB

    MD5

    5f6a6467f02451d2e328b8f4e0f1b1fc

    SHA1

    7e7ab0d9e01b9e0ea8fcfb0cd0dbbb163ca22478

    SHA256

    169f0b0b8fcc35fb4afe628ebec96fcf8331a7d7179ca4cabdfb2a6576ca2964

    SHA512

    dbd41e952326fb9ae3b7185ed3007b05a4ab1c2ee4f7cdee371317c66262e9d7975ca31ec7f938b3cd8277a03ee65f0c5ac30ad813e89d2ef574a1a409efa5d4

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    81KB

    MD5

    6fd29e92a3d9acbf31b5efc46f64cfcd

    SHA1

    78d7c5603c59c69365edbe99ea91e0f6569ab012

    SHA256

    9123cf230feca56f8740b60268c9feb84ba41dae2df31a044070af56b9ac94d6

    SHA512

    3a1430ae7dda716e7459ad539616d3b3c39dda272b3fd9409f69ccbc819664ca659c125e92947bbd63a18b9de14b5645ea7af5a3479d4735f350961f87ec239f

  • memory/2204-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/2204-650-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB