Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    27/05/2024, 12:30

General

  • Target

    89939cee4f573d56f576fce158acd310_NeikiAnalytics.exe

  • Size

    97KB

  • MD5

    89939cee4f573d56f576fce158acd310

  • SHA1

    69c2c0a225ea30b1c4615a33d4d1fb89ece61d76

  • SHA256

    99fd5b7cdaa670b9db2bd7f03e0173b90955995d632a021497f9a6003c2718a1

  • SHA512

    568519524c68a23532a07b15b6e739cd615a376050f740733aef4d47a5df48465a99deaae9f00fcb72c5f65f1b47eb52cb8146b5063b7efa5169578636be6af8

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hfb:hfAIuZAIuYSMjoqtMHfhfb

Score
9/10

Malware Config

Signatures

  • Renames multiple (3446) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\89939cee4f573d56f576fce158acd310_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\89939cee4f573d56f576fce158acd310_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1752

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3627615824-4061627003-3019543961-1000\desktop.ini.tmp

          Filesize

          97KB

          MD5

          08413253b9b82d466d9beaa56d7a0a9f

          SHA1

          249f9f5446896efceadbc7a44cfbfba3db099529

          SHA256

          12ca7570777679d12e7ae8cbc6d1e1c919959f6f989f7c7f8ebff0d6bf396a42

          SHA512

          ba286780d1f729f934bc395f4dd7bca049a8d0ae5d7e970fb2288ab9873f03735c38f44e762aac75a894ad4f317869de875080f1c5a0568a376d4dea64385a8e

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          106KB

          MD5

          546749ca42ea7587f5878f8c2595001c

          SHA1

          893c27adb7bcd6364beacc7a554f7b3f88410c00

          SHA256

          5a50bad8438ccf38c0f79d04893662721a94c562080e2139857ca70a83faff0f

          SHA512

          1bcee9c4004ca91ccd7c990798804439dcf5d188eb6817339e153114e385e8bff108c0488918e6af164f293160e62b6a649372588ddf772a43d56008eb963d28

        • memory/1752-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/1752-74-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB