Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26-05-2024 03:09

General

  • Target

    5903c827a48915f379bcc4baccc02b20_NeikiAnalytics.exe

  • Size

    63KB

  • MD5

    5903c827a48915f379bcc4baccc02b20

  • SHA1

    27f5b2420398daa03c3be21ce26f9fc0f87ba514

  • SHA256

    8183873208f19db3fca967c34c15e8077765c5e06c2a2363b88d651433b7624d

  • SHA512

    c6f55cc5a10a2690dc7e83f22547b5434992b7e6e14e4c8c65b8149697e5047e97b00a5860cb1dd414f96a28d3689ed4eda17bf23a71f4a24f3c58c17d53d329

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8i:fnyiQSox

Score
9/10

Malware Config

Signatures

  • Renames multiple (3452) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5903c827a48915f379bcc4baccc02b20_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\5903c827a48915f379bcc4baccc02b20_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2292

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2297530677-1229052932-2803917579-1000\desktop.ini.tmp
    Filesize

    64KB

    MD5

    77e63ae580a92838307d4ec8992e86fe

    SHA1

    601ecd346a798a79222e030c5ff38a3fc913672a

    SHA256

    50fa213d85afcdb11c3acc728f9a30b2a0ab7226728597f98dddbf91a293ed2e

    SHA512

    99e70eaf7d38c3ba4efb7bafd37a7bb4a17072a3092415bb84eb551c74684d573901f8cd200fadd11cbf224f1e0b634e68ebb3d6b57eed04897be5fa1ec7c84f

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    72KB

    MD5

    b76efa8c33efe2b5ae8d72c25b21221c

    SHA1

    7d176eea5532debbfa08f9f96a739a922470b97a

    SHA256

    2fd4e8b666a1c6b0ed6cbadb1c37d18c49cfe781cdd436a1617842bc5f3c7634

    SHA512

    06c92fd00d2b1f522a6326960010e1383b9d6eb532c2b6c2ae4eec75261e26be2dda9cd2025bebe82b8ea45cebab06663e0cad56e80a40635c87b3d2a9a4b5be

  • memory/2292-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/2292-644-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB