Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    26-05-2024 01:36

General

  • Target

    4a58fe6a471575bbd67b8fbbdec341d0_NeikiAnalytics.exe

  • Size

    47KB

  • MD5

    4a58fe6a471575bbd67b8fbbdec341d0

  • SHA1

    6d0072c72a6a0845f58f96bd438c284680e959f4

  • SHA256

    4935252370ec5f68f8b5f6ae7486852ce5695a8fa590a7bfe1f6c93af21a5784

  • SHA512

    6a38868f7d56a0af508fdb1bbcf3a8cba30d960eb47f0d080703ab33d8573b3182c4ccbeaf732b33864475d4cb7fbeafee430292d929cc4f061743b5da2a199c

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFax:CTWn1++PJHJXA/OsIZfzc3/Q8asUs18X

Score
9/10

Malware Config

Signatures

  • Renames multiple (3840) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4a58fe6a471575bbd67b8fbbdec341d0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\4a58fe6a471575bbd67b8fbbdec341d0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2980

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-268080393-3149932598-1824759070-1000\desktop.ini.tmp

    Filesize

    47KB

    MD5

    bf0d7bfc578c7a395dbf68c11bd1117d

    SHA1

    2ffcf36c1c34387bf27f35d7fc543b8104c77f61

    SHA256

    827cf9f2721fc2a958ed5e5da54bde5686090babf47357d8e3c1611472b186b8

    SHA512

    9869ee3ab3d84c1d7ed60a0b3cc511f51c46ac3865a1588c553bfd4c3fed5c102ec391212cd98e26e9d3ac9bdb2783d253ed74e9dff7c7a9cd455a46108e1e03

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    56KB

    MD5

    04835aa1ccab5962c62f462b2fc382cf

    SHA1

    1fac82740052a7f8860ad825a622c06a771089c1

    SHA256

    8458cfe131327c9ad385a231c681b59a5c825f47454a42b7ce0af6d696de9ed0

    SHA512

    4889b187caddca9363a16bdba56134be695fdde69dac3e6633d86166b37835f2b3b853c7ec11efaa26c4fe89b78b1b77960abbcb70c4957c5479f1acd0664a93

  • memory/2980-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2980-86-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB