Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    30-05-2024 15:25

General

  • Target

    84334597f7875ef7391eb3e74aa52ad0_NeikiAnalytics.exe

  • Size

    43KB

  • MD5

    84334597f7875ef7391eb3e74aa52ad0

  • SHA1

    47ecc7bd306305abf9c46381c924a3f94b3e9367

  • SHA256

    8b6369e5e2cd6e56846c2e2166f79352c8451c48f34752140c9d44f628c57077

  • SHA512

    063187c77b14e0306bb378b8911504dc70cd4a7cacfd0c24470dc489abe6637eb2cd611c22bfa29401f7a4b107af3379c1a0adb3d48ae7e32df3025ea13278f4

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFQ4:CTWn1++PJHJXA/OsIZfzc3/Q8Q8/8v16

Score
9/10

Malware Config

Signatures

  • Renames multiple (3743) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\84334597f7875ef7391eb3e74aa52ad0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\84334597f7875ef7391eb3e74aa52ad0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1920

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-268080393-3149932598-1824759070-1000\desktop.ini.tmp

    Filesize

    44KB

    MD5

    8a33a722d9e3186ba9fae1d3a5939aa5

    SHA1

    df7b9dcdd803643910ab6b75edd68a51a6e7b53b

    SHA256

    6a89998d93ace5c28f3cc094ae7b37186590ebd28da3133eeac9ed5d42e01b4f

    SHA512

    790eb2b6432e84af30c6556bffafc3b22fac5047bd28b5075160c12bdc12bf34198ddc2b1e4123422d13f58889202a39caa8710a617bfe30a496816202268309

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    53KB

    MD5

    2b0cee91e1c36b5473e0a33af80cfb71

    SHA1

    8b3e2adb3fb4b4d9ed5c6fc2ad511c4f8b73f601

    SHA256

    054eb4cafa8737c836c5a16442734f4e9393e307bb6ba7e62cd92fd32dbf6d78

    SHA512

    608171ac92f0033c1dac5ffeb65868f196a48737b4224ae0c3c36f1552d42e79bc0e7b1fa3ecc288ea6bd875fc58ab7aa05d40bfbfd977e51dbe7078fd184416

  • memory/1920-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1920-86-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB