Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    27/05/2024, 07:14

General

  • Target

    246963b57f03adb74e7dc939042cefb0_NeikiAnalytics.exe

  • Size

    130KB

  • MD5

    246963b57f03adb74e7dc939042cefb0

  • SHA1

    609f76ef485a173920262579919a23bd915a3d50

  • SHA256

    f64d3262e3de49ad4cc8297b309b498b62485f2e937aafb10e5b02f8576f3456

  • SHA512

    021801773d4a81ac9c84508d0e0fac30b80e50e8163ff4c886399c2f9ce20e9e0f2a626e01d96c68a2b88b1f8cb0ed7288fc57f9c3958271ab15333b080dc9ac

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8yimTWn1++PJHJXA/OsIZfzc3/Q8yiyg3:+nyiQSovQSoxg3

Score
9/10

Malware Config

Signatures

  • Renames multiple (3215) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\246963b57f03adb74e7dc939042cefb0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\246963b57f03adb74e7dc939042cefb0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1276

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2248906074-2862704502-246302768-1000\desktop.ini.tmp

    Filesize

    130KB

    MD5

    85fe90b74898aa2ba49dba316279a6ca

    SHA1

    7ad07cedc6a30cad512b5973faae2be0c8ca28da

    SHA256

    a0d78f9bdb1d2783ce6e51cf4e9989b54c5ec877875765e2008afe21ebebf0e7

    SHA512

    567b18ac7b5715c354bd80fb5dfbfbd94e73c3e5d3f79677f1c546a06e2f78540abc7a908851f58c61744f3a9e90b49a4026674fb4eb5a4e65d58b33f9f26d53

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    139KB

    MD5

    c25721f19425a5eda60cfc7e7b4cc698

    SHA1

    e9ab59e244547ed13061ef00a672d8efff0a8391

    SHA256

    d0c362ebba094e3d4b349adbfe3ea0309e9c199c563f618c4230ec3a29a6c20a

    SHA512

    3bc5c2029dc315ae6de4b775976470f880682c7d961b9ffcf9366ad7c5223079082575fda7f56744b5d4e0184d46c6dedd369aa0e41579132675cb8c6c91233b

  • memory/1276-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1276-532-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB