Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    26-05-2024 00:20

General

  • Target

    3dd8ff79c363ef4e46336a51dca58ab0_NeikiAnalytics.exe

  • Size

    217KB

  • MD5

    3dd8ff79c363ef4e46336a51dca58ab0

  • SHA1

    402d5572d92e071ea1757e7dce59ac1d9c36ae95

  • SHA256

    f423e88c6e3899162ea01e2e87234e6087ff97c055475eefb1e3e02a44891c11

  • SHA512

    dcc57449dde56eae0a10802f9962b2203520fd70a9a4d5e2c3f898b8e5068b2fa55994888b7e55b8741c605e9c526a7d7b6210e2e4decda314acb5785062dbc0

  • SSDEEP

    3072:+nymCAIuZAIuYSMjoqtMHfhfFfAIuZAIuYSMjoqtMHfhf1:JmCAIuZAIuDMVtM/XfAIuZAIuDMVtM/r

Score
9/10

Malware Config

Signatures

  • Renames multiple (2887) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3dd8ff79c363ef4e46336a51dca58ab0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\3dd8ff79c363ef4e46336a51dca58ab0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1752

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3627615824-4061627003-3019543961-1000\desktop.ini.tmp
    Filesize

    217KB

    MD5

    1cd0592d6ddc2d121d6b30b6ecd21d4c

    SHA1

    0c3daa20c1edd0d67302aa44caacef8173bcfa9d

    SHA256

    82714af85ca5970469608f7969770bb1ca280a0b5a7459e1a984f6c798f2f240

    SHA512

    f166c0e1341b72816e1d42c88f55e24b2b1f266434ece44c12c6d967d779523cf744f951a63c4ecea7a270d90663d5f366ff84e073f5760531762fd8e75328cc

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    226KB

    MD5

    a38f2f8907dd901d8d4ac6ce08858dae

    SHA1

    a8bee18d620260a7f157679e76263e8475d0ddb1

    SHA256

    a038937afe49e1b0f65089a38aa8c42a47bb7fb7dcdb4bf75f80709df2d0c169

    SHA512

    88bb0c0b6c48548a22e0017d8ba71199e185590ab5e25704acc940ef8a3c184271fe9ccc614acbf8c0aa4e0c8abc9c736ef7d220cfe156e46840c46298d4cae9

  • memory/1752-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/1752-410-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB