Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    27/05/2024, 11:14

General

  • Target

    c16471ae72f7b4e94933aa41cb6ab380_NeikiAnalytics.exe

  • Size

    45KB

  • MD5

    c16471ae72f7b4e94933aa41cb6ab380

  • SHA1

    2a86fa49133ff677609d77f897cabb99d254a3e7

  • SHA256

    1e92727ba99cafd0f658470e2b1a135311039c7e40f4c8e15aad9599d785f59b

  • SHA512

    d5cd0613287ef0d3394e734788a8d12441c8e37159bb207b77791a9dc74913595d18828e91d19b31ea77126c057c7b019a4a992b95a495e68892891b21e63dfa

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFQA:CTWn1++PJHJXA/OsIZfzc3/Q8Q8/8fTo

Score
9/10

Malware Config

Signatures

  • Renames multiple (3761) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c16471ae72f7b4e94933aa41cb6ab380_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\c16471ae72f7b4e94933aa41cb6ab380_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1660

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3627615824-4061627003-3019543961-1000\desktop.ini.tmp

    Filesize

    45KB

    MD5

    cc48d36742067a3be899efdc37b31d5a

    SHA1

    77a1ef030117e7487469784c64fdc69ab89ef5ed

    SHA256

    691cf22c100dcf50c91a457ea7ccd3e43e9a2baad7fa385f0a593e56652a0104

    SHA512

    2562bfcc867bb6469107faa084b4dc37f724c7f5251e9b3b8181fbe069d9b36b6a333a6bfce61d178884530241ae6c487721c35fce18d3878d4b763b357019b1

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    54KB

    MD5

    a3a6ecd6f2076b5d11fdd78bfeee4842

    SHA1

    883cd1f6e14bde38d986e0e2dc98f2cfce16ae1f

    SHA256

    230c606141c462f9dcf0be32f57c58be691dd884c1191b0fa90ba968003b6e38

    SHA512

    d7bbc390aca3768cc7622acd0af2d7f84d15d1c4514105e6cb0aa8d8c175c69db627261e543a9077f06c7223b5f12dc26a213cf526a51372078528d54b43937b

  • memory/1660-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1660-86-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB