Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25-05-2024 19:20

General

  • Target

    0fb464bf25da53b9ec21dc4edec28f10_NeikiAnalytics.exe

  • Size

    72KB

  • MD5

    0fb464bf25da53b9ec21dc4edec28f10

  • SHA1

    a4d92980aea7339ddb11d8972f098d44cab1d404

  • SHA256

    504a1f79aeb0a6c93d9bdd71aed0c26095c71627ae22923d0fe981de76261161

  • SHA512

    1a63cdd6e87dea4bcff0f0856ccb4a7a7f7ca57b8026995551ce74c351eb53e35aa402ad78625106f449b58dbbc2d837ea5708d9aed573d174c98b64453e3e6c

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8xJJMJJu:+nyiQSog

Score
9/10

Malware Config

Signatures

  • Renames multiple (3726) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0fb464bf25da53b9ec21dc4edec28f10_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\0fb464bf25da53b9ec21dc4edec28f10_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2040

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3627615824-4061627003-3019543961-1000\desktop.ini.tmp
    Filesize

    72KB

    MD5

    8865dfcaa6cbf37ed086e0f6bfe409eb

    SHA1

    317171542c22cf4256fc3a073f01b47941787b46

    SHA256

    0fcb4c681e71ef2e3298e26ddd2608adb021aa18d2e6f76687422fa3171683f1

    SHA512

    0feca8ee3d606680235e2775eb5960a42960e9d9ff87e7991393422ce83b1a96df947f1ce57954c89a2590785ce3541830506b97d06baf667d35bc013b2ee241

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    81KB

    MD5

    de592beed8c1acbfd5dd34a0948b25ea

    SHA1

    525c649db780b6c78d93af295c5fbdb5fa317bcb

    SHA256

    593fc7af8d4d19f59efdd731bff340f26b982d2972dfafd721e2a124d5d48610

    SHA512

    a1b3cc2f0dc805097142a7198ee62a44b63006d2e1fd78fc96eb60f742a2387b67889969fcbe880e780fc7db331f2fb3273f5e242f298791e300e0cadf4d24e8

  • memory/2040-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/2040-650-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB