Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26-05-2024 02:00

General

  • Target

    4e31383fda1d331c4457b76475b376f0_NeikiAnalytics.exe

  • Size

    73KB

  • MD5

    4e31383fda1d331c4457b76475b376f0

  • SHA1

    30183d8d7bf91f39dc12f5695038ea2134d0215a

  • SHA256

    5303392831813debcfa3316caf0506efa90d6b4eed98b5b412ae2bb0de5fec70

  • SHA512

    8a5744c5355fddcb1636b29c7896d183ac7dff2281d428773b17cff1423d61c35f4d38fc4b2550c211b9958faca672f7531bf4e2b7d8096dcc7ae4baf029d98e

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8asUsDzVe/0AP:+nyiQSohsUsa

Score
9/10

Malware Config

Signatures

  • Renames multiple (3504) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4e31383fda1d331c4457b76475b376f0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\4e31383fda1d331c4457b76475b376f0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1972

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1298544033-3225604241-2703760938-1000\desktop.ini.tmp

    Filesize

    73KB

    MD5

    1efa9fd5df1d9f6c31f9a3e62e3c774a

    SHA1

    aa9983ac2c74ebefb996a838c1cb95b4dafe8303

    SHA256

    cfbf80e17fb81c14a1fd5df592cc07ee2c09d2a85fa2c9446b6861e0b816d708

    SHA512

    a5ef11ba54f97eedccdc2a7c13f0ec3fa9042e5ac88b6ee34eddac3a8691e8825d398596b54fd28d3e4ff873b4928993c5dde49327166b3352b42b9df819640b

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    82KB

    MD5

    30d02fa3645c591737f8d5e97fbbf799

    SHA1

    2211760750ebf779b77ff6056ec68129b1de62e6

    SHA256

    3b27b9b16382bb1d471195afcc80ed37c3e0cf0b77906cd30aa94ebd0bc46f71

    SHA512

    1bcb55da4991624b782357130003b4cbd1cb17118f8527d77fa721aaccd246a7390b35b61f6d4660100f2604f930c4b628364ae9155b8472bf382ad328d923a6

  • memory/1972-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1972-648-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB