Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25-05-2024 20:27

General

  • Target

    1b66f1dd9729ade1d4a1277356553310_NeikiAnalytics.exe

  • Size

    202KB

  • MD5

    1b66f1dd9729ade1d4a1277356553310

  • SHA1

    0b6607b7161e09635d9d010f93dd875ab9b7ebd2

  • SHA256

    23b6b02888e21c328eb443450d2d960524117c90c7d664f4e101c43dd554ea54

  • SHA512

    66f0d4d732e31e9429f36a41f3e2dec89dfbf42242528970acefc3dc1348fdc8e8cbb2e65b3fb5b29178f8bd076aab8cc603cdf1dac9319eaabe5fc9f824fbc8

  • SSDEEP

    3072:enaym3AIuZAIuYSMjoqtMHfhfJ6W2QZwKS7y:wHm3AIuZAIuDMVtM/L2ZKS7y

Score
9/10

Malware Config

Signatures

  • Renames multiple (429) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1b66f1dd9729ade1d4a1277356553310_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\1b66f1dd9729ade1d4a1277356553310_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2172

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-330940541-141609230-1670313778-1000\desktop.ini.tmp
    Filesize

    203KB

    MD5

    97d2b6d40cf93676a19aa34af17e59ff

    SHA1

    11fc38eb6a7c2c220a6946288205a47bcef9ea9b

    SHA256

    6841f2e668ff787daba84f68a9f444c005ffc2e01a6a1a8f540803cd8b501d8f

    SHA512

    1adc2ab38700ef645ee93583ee1089744b40c96b0969d09bdafe81f257ad52ef36415fbbf180abf8c10bc0fd2a050727cd67484cf8e731950ed5470f30b105f4

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    211KB

    MD5

    11d12982c5107a7892025993bc542e74

    SHA1

    ea1a70957aed8fdecc7948a86e6b84d14b1b61d0

    SHA256

    6671a48e6b89c5108920254299172a787fdf235f5263ea30b429ccce1e0f3c24

    SHA512

    e171945dee3e55b9ea67cba4bb4c2263f74757cdb65052018ba34143c0275f96cf4e5d2dee9c027a86d1ad9404452ee38d3700e5be36847d4b44817a6d99a76a

  • memory/2172-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/2172-68-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB