Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    29/05/2024, 05:30

General

  • Target

    45d33ea6b5a180e27be83baba876f9f0_NeikiAnalytics.exe

  • Size

    45KB

  • MD5

    45d33ea6b5a180e27be83baba876f9f0

  • SHA1

    57122b9cc8d9fd598d0a4ea723c72c71dc87cd42

  • SHA256

    4e5bd3866f31a5102f41c8eca156c0a5003feb29c949b6fa0900a8988d2635df

  • SHA512

    4f8dce2cad509335695f14fc6369bf006ce2f6226f0cabc86e9721853dd03ea6556e8742c670c081e523621ce5574aef58a6d4f4527fe8d73695674cf995d2fd

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFaz:CTWn1++PJHJXA/OsIZfzc3/Q8asUsQ

Score
9/10

Malware Config

Signatures

  • Renames multiple (3666) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\45d33ea6b5a180e27be83baba876f9f0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\45d33ea6b5a180e27be83baba876f9f0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2104

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3691908287-3775019229-3534252667-1000\desktop.ini.tmp

    Filesize

    45KB

    MD5

    b84bd3b63facd70851a8bb214e6a6477

    SHA1

    ad51b2965bfb6078d6f7bda9a666837caf16015c

    SHA256

    2a6d05b7edc8b3f1b70395a79e10ad8f48bd250023e51e221aee58c4e577601b

    SHA512

    fc4e022271796d6fada5f39aba131ebca728fd5312ed6080315285c140ea5052a9607c060433f082fd09b1a928d5337b71ddad0494cefc7034f24edac7d5b7d6

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    54KB

    MD5

    956a8a5fdad0249f6e0fd0e50cb33c3d

    SHA1

    d083a03fa74625dcbd2b221ebc69cc86eecc47e9

    SHA256

    7cba4d813e479309b998e4239d1a230b48cb6d0b0a9afc3ec2ef4dfbb67ebd6b

    SHA512

    9dccc223895a46fdd3a8f18d335d3d4f4fdaad9d3541e60cf8e5185d5ff5c76e3f073d732d1bf3e1b9df63674f8e0464d0bc476c43bc6b883bff95b8b04a5edc

  • memory/2104-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2104-76-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB