Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    27/05/2024, 20:19

General

  • Target

    175183b49183c7e6b1235b7f6395afc0_NeikiAnalytics.exe

  • Size

    41KB

  • MD5

    175183b49183c7e6b1235b7f6395afc0

  • SHA1

    76552da94e837e43cec89d28126d607a9f2837ac

  • SHA256

    9c0b8e81178b1f9ccd714a1c893c25bd3d9066648e7af6bf8d86c6296f2f0801

  • SHA512

    aaa7d3c8dd7219ebe856ab46dcc9d04b52ac38fa5daebd5d2d763b59bf07d96e5af2ac1c9dafcc450c47b068ed0bd69083956fc1156316c50d5738b23aa4182e

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFkv:CTWn1++PJHJXA/OsIZfzc3/Q8k6g

Score
9/10

Malware Config

Signatures

  • Renames multiple (3788) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\175183b49183c7e6b1235b7f6395afc0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\175183b49183c7e6b1235b7f6395afc0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1148

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-481678230-3773327859-3495911762-1000\desktop.ini.tmp

          Filesize

          41KB

          MD5

          c6f822956896960826bafb26bf44f4a7

          SHA1

          f5780449069637790135247aed768b5d272ba423

          SHA256

          cea858b4c993459bc8b41f9f005bc6984a0854c23ba04b23e2b91bd910dec471

          SHA512

          02a7fad6b2618e5bdf9cbccbefcbcad43cb95c3576619928a4652361ab7f440f26eb21bcc08f9e996498d0bbffc8619a0cb6657ff39570cfc78ba412f2b2102f

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          50KB

          MD5

          df0f6e7eb77e90e7dcca262609f122f4

          SHA1

          517ffe34c34803a9c7213b254b005f2e514f7ee4

          SHA256

          95f61451ed272a17bf76ee8f0f30984142434560c4e688d2c1b5e05c3ac139a0

          SHA512

          6d29e1f30b856aecbb2be0d8029ca1c7d39cfa45c7e9f000445fc5e730540e6d3c570322050489bb4a5a5729749d69df39f763c87351c412a7c37be7b7de55b6

        • memory/1148-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/1148-82-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB