Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26-05-2024 05:15

General

  • Target

    6ee8ccf365a4ef8fd29889f2fe1d5950_NeikiAnalytics.exe

  • Size

    103KB

  • MD5

    6ee8ccf365a4ef8fd29889f2fe1d5950

  • SHA1

    081e6a075f5980c2da1e607c65dbacb9c44b42bc

  • SHA256

    40420ee419c251c03090fcf46c36ea712a6a62fdd978c406bb14a05fd47d22b7

  • SHA512

    7e4a2b378ae52ac75d3d4a7ba3cc573df4c0fdd5bd6aa50a0d9bfba19b0d88ab7334c0cadd6fb3152e651a38ab5669bd5a8901a966b8d9eaa5087a46c3586019

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hfOA2:hfAIuZAIuYSMjoqtMHfhfOAkfAkN

Score
9/10

Malware Config

Signatures

  • Renames multiple (3437) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6ee8ccf365a4ef8fd29889f2fe1d5950_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\6ee8ccf365a4ef8fd29889f2fe1d5950_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2408

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1298544033-3225604241-2703760938-1000\desktop.ini.tmp
    Filesize

    104KB

    MD5

    e610ac369648b84f52c6e0dd6aa02517

    SHA1

    531655e461375909427c3bbbb82709ced2f7e3a3

    SHA256

    27ba7d178a093f3bdc341215c9b5659ea2a088617b05339878289109b638aee2

    SHA512

    be4d419ec8356c386c59b90032d340bbcbafc9a4f5eddf442735bd99ee3fdb78f7cb084e1b8bf3e629aa017d5680adf63686dc21d7457c6366b3f74d4a901bac

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    112KB

    MD5

    97f82300b78bd842daef61e7a508942f

    SHA1

    24053941a1d36c697a15fb45b24f12028e76dc0b

    SHA256

    014bae3105043270a6f0a0aecbf73d4dabe280c4631a1b092a8a1b7459b262cd

    SHA512

    e75555dfc5ea35d71ade83d0e30602477f59ed78a0b1b7ba6b8d306c36152ca713bef5de22e7dfbe6397bc8b0e702a4afc4534bdff511537a4a28abf7aca8683

  • memory/2408-0-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2408-74-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB