Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26-05-2024 01:54

General

  • Target

    4cf76a49efc4f88ff48b23477edb4a80_NeikiAnalytics.exe

  • Size

    70KB

  • MD5

    4cf76a49efc4f88ff48b23477edb4a80

  • SHA1

    2e7629340f1a434fa896510cfb9f01fc2d8b3484

  • SHA256

    69f98bfb43458cd47bdedd6b5aa1b79494f6c196c71abbce0c4ff34efdeb7f1b

  • SHA512

    b8292f38339bea8ca900ae3d6ddd24b2e11c24073c9ac13a72d0ef021fa619678267ee83f6a076a35eb6eb56287664292bd298d4760be28661f57b5586b3fbc6

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8asUs18/8T:+nyiQSohsUsOkT

Score
9/10

Malware Config

Signatures

  • Renames multiple (3455) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4cf76a49efc4f88ff48b23477edb4a80_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\4cf76a49efc4f88ff48b23477edb4a80_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2208

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3452737119-3959686427-228443150-1000\desktop.ini.tmp

    Filesize

    70KB

    MD5

    097676c1d4d49469366299eb5b1b0b9b

    SHA1

    94b3a69e3f1ea728be8db24105e6b88e0e0e06b8

    SHA256

    ac74042cd9b99dbb109b7f35f13713038499b61bccb648d431ec0f738af018f9

    SHA512

    29eca34cc284acb7d84562bd4ae173f776ecc2f6b6297164143c6055b4cd07507f5390e9a09f0785e32b2cb43bf628793216d8423951e9192d26d511415f1e16

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    79KB

    MD5

    2b9157e336d0bdc32804a28142d3c0c8

    SHA1

    90e033be53b471232db1494117c05f2531fb3bc9

    SHA256

    03847b0ee0144aa195a4ec751da2abc002117cd830e527fcc325b721783a76a5

    SHA512

    cf34e810bd47d4ef02779ec5867880f27c05b890981a6500747afd0da7521ab6a3d24b7d66d2685dd024dc63a468b4cd810fbe5c962648dfcb73736c310bcd7c

  • memory/2208-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2208-498-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB