Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    30/05/2024, 09:10

General

  • Target

    9b2d16d907e5af463f99a6ea8730a490_NeikiAnalytics.exe

  • Size

    47KB

  • MD5

    9b2d16d907e5af463f99a6ea8730a490

  • SHA1

    89e7904902a2a0236bf0f822d6759e5d0026094d

  • SHA256

    d75795a94a811a4a6195acaf92d6b294e59edc1a1f7efd2f5741f388fb47d91b

  • SHA512

    080e413595cd325d4f19a1b2ba1e945154e9fc71b4ba6ec6f638967a6a19a12f20e825bcdbadd2ba610f5a0d4b0c9130d0a63b95208187504639ed34a00fe68c

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFaD:CTWn1++PJHJXA/OsIZfzc3/Q8asUsxe3

Score
9/10

Malware Config

Signatures

  • Renames multiple (3773) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9b2d16d907e5af463f99a6ea8730a490_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\9b2d16d907e5af463f99a6ea8730a490_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1700

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-481678230-3773327859-3495911762-1000\desktop.ini.tmp

          Filesize

          47KB

          MD5

          abde8525bbb914da9e4f39cd9911adb6

          SHA1

          fd5348923cc6d61c0a5253718fff74e6bb8db64d

          SHA256

          3926a61d6d78c4ca460dd0dc88a90327462e41e2e22121ab8a31be1811f11595

          SHA512

          181ce41fa52ecedca04dfc9a87ba5f1fce13092376cc0207cf98b50630b053dd15a34d07b5a1a8ea5fb6dbf6abf77d1cedf381feedb6054000952fe1b2581424

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          56KB

          MD5

          5b7a67487a8f6da07cabf17826ce5172

          SHA1

          fa7f755557b19e178b38970a8767f8818a28d59e

          SHA256

          500bef89326294a9f8893addfe46398efc4173b73024f0146c58773c0695d902

          SHA512

          ba098895d05a17b47e436e18fd5ec53680793b52b7e7866fc3f685154455979ba478392db5de3915e633bcebc34c294ce36c890e2594b4afe226ae8fbb028a47

        • memory/1700-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/1700-82-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB