Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    03-06-2024 22:24

General

  • Target

    0aba2c002be94be85a7c18d9ca136a80_NeikiAnalytics.exe

  • Size

    113KB

  • MD5

    0aba2c002be94be85a7c18d9ca136a80

  • SHA1

    1b25915db584f0361edb2bbd25e99b7f0a29add1

  • SHA256

    e0f43e6cc4999918588b786764f81e3125cfc1440e3bdf2fbe4e1bab209d99ab

  • SHA512

    0454e0ae369f2f70b2ac8674e383437594fd9fe9fc3e2faa2fbfe9ac4548da8e5191d462a87c5c279e8c0be34b881231701708287ef5f39cb090d3ad915f1110

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hfagE:hfAIuZAIuYSMjoqtMHfhfagE

Score
9/10

Malware Config

Signatures

  • Renames multiple (3184) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0aba2c002be94be85a7c18d9ca136a80_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\0aba2c002be94be85a7c18d9ca136a80_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2424

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-481678230-3773327859-3495911762-1000\desktop.ini.tmp

    Filesize

    113KB

    MD5

    2e7330a1565ac474c5e15262f3bfd696

    SHA1

    d91f0c03114ccec46a3e4bc8074450ef8f5a21c5

    SHA256

    8174662912f0de95d08e06730e931d19e4a91ef0ad5dfd9bf4650a0a18c5140f

    SHA512

    6ecc67e8ffa153149112e8fbdaf2fab15008feb8ae61e55d41f3ff38656a8c6b995725c83ec0f04889cbd5da59082c4c0be6df786cc90ebfd6d8eb90d1ced703

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    122KB

    MD5

    c6fa37cde79ced027f358b64abd40f8f

    SHA1

    14082bae409897d0331755ecbff12207e585a061

    SHA256

    8df31bd84738cb45b7bde6324b37010828c6be3879449b236632dcc0b70ba2e9

    SHA512

    c6b9d79deb519f447e1e64b355cafcdccbb49447754b2aa031207551de15d3e3237156a1a7068167f99351c728482439916807e72885068dc185f304a9493e14

  • memory/2424-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2424-74-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB