Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    31-05-2024 02:46

General

  • Target

    73e9736675673bd03d031e1ab0f432b0_NeikiAnalytics.exe

  • Size

    47KB

  • MD5

    73e9736675673bd03d031e1ab0f432b0

  • SHA1

    6f853bf049dec4ae02500cbabd49f2a3878a67bf

  • SHA256

    073298d584e950071b4c828748f6e710b7a4f58f56e22a6ca9fe69a2ff0320b7

  • SHA512

    85aee2842ddb61e432103ae09d2e0445c29b9406b88cc256fca1f2f4e276b1a1f2de1079aa43522e795938fcd7c50b00157a0dd3f9fa877d62d0d658b94f2a8f

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFz7:CTWn1++PJHJXA/OsIZfzc3/Q8zOU

Score
9/10

Malware Config

Signatures

  • Renames multiple (3668) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\73e9736675673bd03d031e1ab0f432b0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\73e9736675673bd03d031e1ab0f432b0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2100

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3452737119-3959686427-228443150-1000\desktop.ini.tmp

    Filesize

    47KB

    MD5

    d90755662ac33a50e6dbf451534c860e

    SHA1

    2582722a9b54290888f5b2efdc0503e4a76a19db

    SHA256

    d4987da4756f8c08dfbebeea380d55b202196dab7e3c0b4928378eb45dbb3b47

    SHA512

    edc9c8ed94c3ed9e4171b194903f7ed6d17085eb1ebb02e5f002c5c05367f2a23d64f2538689b56f491c9c4af9b63e984162ac67fd9f2020a18082a1d1f406d8

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    56KB

    MD5

    92aadd385cc565345802ad2670414095

    SHA1

    a2313bd918604a6b4b368b19d33e578313f24d1f

    SHA256

    3b8718c714a6a669d68403c53addb1593a2041698acac131c4e87ef89b7da4f7

    SHA512

    15ee0090384face39c693cf7d3ab8bcb5cf7437cf73c0bb1829a50565c0aebffb3c420b5de75c6670f1b05a8f99094bec1a9c5490290762ed2bdb9ed2133d441

  • memory/2100-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2100-76-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB