Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    27-05-2024 23:20

General

  • Target

    2698cc9509c2394f6344f6e3ff02bc40_NeikiAnalytics.exe

  • Size

    54KB

  • MD5

    2698cc9509c2394f6344f6e3ff02bc40

  • SHA1

    c473a7303fbc0e715f6d233490aa603c742ba86d

  • SHA256

    1b822c4e2d74b889963fc6b92fad2afedafe68fbbd7c3a125b38eac179b84b00

  • SHA512

    702e1f0007aa5723fe4d9d3d81b4e53ff00cf9502816a646a2e8369163700c90707d88af945262d9133e63e377144814ee449e56a56f76012621ebec3d156d35

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFFg:CTWn1++PJHJXA/OsIZfzc3/Q8yiE

Score
9/10

Malware Config

Signatures

  • Renames multiple (3691) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2698cc9509c2394f6344f6e3ff02bc40_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\2698cc9509c2394f6344f6e3ff02bc40_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1760

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-481678230-3773327859-3495911762-1000\desktop.ini.tmp

    Filesize

    55KB

    MD5

    7ba107eb1d0e8805ebddddbef0b2fb62

    SHA1

    b0e4566d45d58e1235f720453050033ae9644ef1

    SHA256

    cf486a23ae6d231fa306f083cde4f27dd5b68cec9c0965b8bfa7a960f83025db

    SHA512

    b945a01ff1fdf78c0a82b6d9fdc4f5516ab0901bba6433329d72b09cadaaecf6c494198fd71c4253a2477fbc09a6db86029a2ec3b6f8ac4afb2bd42e107a9eb8

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    63KB

    MD5

    e035bb3f45d6f094773fa303ece2640f

    SHA1

    34dce4695426db4c4a586138bbe4103f87790fdd

    SHA256

    3092e155c49b74bd0aec06cd6da9964df6692c76074cdfefd1638079372d2e1c

    SHA512

    d074f9cf36652178c85252a00aa537c2310a19785a0d60f95ed5cc70a25aa4066b6334517b1f4d90431134b2b3611721180d1371d5c6ef2b7af1a1078fc73ff8

  • memory/1760-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1760-80-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB