Analysis

  • max time kernel
    149s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    26-05-2024 05:55

General

  • Target

    7686fd051ecdf08b07ae3ee813a06010_NeikiAnalytics.exe

  • Size

    40KB

  • MD5

    7686fd051ecdf08b07ae3ee813a06010

  • SHA1

    8e53a047d11df0f84f74cdbe66f5238d4b79f4eb

  • SHA256

    29ca5b0b7d0921ff8a4acfb97d624da478b224fe7a761a6668ea500333239897

  • SHA512

    d8aff33550bf328967ccb0e82c2f67437776a8d9c0dba30647fd4389995c04dadc54ac812ec5a23d80a345de9ad828efd0165fc6192cb5725d343953c072c0f6

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAF9:CTWn1++PJHJXA/OsIZfzc3/Q89

Score
9/10

Malware Config

Signatures

  • Renames multiple (3699) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7686fd051ecdf08b07ae3ee813a06010_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\7686fd051ecdf08b07ae3ee813a06010_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1632

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1298544033-3225604241-2703760938-1000\desktop.ini.tmp

    Filesize

    41KB

    MD5

    4fca5302f89f5b489185580caf810c9b

    SHA1

    3b518603d9d039e8713f96b68bfd0d73b1b3e786

    SHA256

    31a88dbf2e663f99047991e183f8b0525b9f0fb675e0f6e8ce2433b556a30ea3

    SHA512

    adf302d2e235c3add87f59baeef4124380cc326c30370366d2d2b162a60e8ad0e48024075533c9606ef9246743da82f4bad9fc76f60699d0b085eee023b087b0

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    50KB

    MD5

    d4fadc8d6a8234b5c2e4f3b98dac2d36

    SHA1

    77e57c7201b3fab20314f2e681f912c4001ee4b7

    SHA256

    c8f35cd3466363e89b5cafd604047337097ad61d64dbbe73ab74c1c4b91d42e3

    SHA512

    d1e8cd28f4d24c62eb429f218665a353ddf9cb5e14bbb45c6af9dd59fb369bfa42805b06c486b89e54ff7836e12d6372cbc64ccd704cffd9b12948abc7464fb5

  • memory/1632-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1632-76-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB