Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    04/06/2024, 11:21

General

  • Target

    7d64c9c7d46556d777db3251ccfcdb40_NeikiAnalytics.exe

  • Size

    60KB

  • MD5

    7d64c9c7d46556d777db3251ccfcdb40

  • SHA1

    534f37e88132579ebb6e8d602fee00776c884663

  • SHA256

    9a2deb36df20e806c070d529f4a0c74610235fcb763b4d80003ec2241b59e81f

  • SHA512

    a814e05d28af7a95759dd591fd9869d9aad8b467f4493138f78015ee5eb2fc1b98cb80d13d9b2495c021f00bdf2edcf6d4db730c07a2285d766191bfb9b072cd

  • SSDEEP

    1536:CTWn1++PJHJXA/OsIZfzc3/Q8yi+y5gfcL5y5gfcLg:KQSoEqeaqeg

Score
9/10

Malware Config

Signatures

  • Renames multiple (3707) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7d64c9c7d46556d777db3251ccfcdb40_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\7d64c9c7d46556d777db3251ccfcdb40_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2364

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3452737119-3959686427-228443150-1000\desktop.ini.tmp

          Filesize

          60KB

          MD5

          b198722b2144775992b92d3a69a42054

          SHA1

          47cfc75402d403683bc2820e53e008d32d8eede7

          SHA256

          b79ee34a646ff7a1363a1b5f850732814502f1958eb25845dae15b47eda66ef2

          SHA512

          539a12dcb70ccdd2e662e942edf76670af570468c9213dcc493aa22cc974be8094ec346c252af06770a5fbb9514362de218f272f061097d8da48bb22d9bac2f7

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          69KB

          MD5

          8b24c6c1037d0d87132f3ec4d4beec85

          SHA1

          32469351d56a66088ff46d9176e4ec64d08e412d

          SHA256

          810d6e96cd3e0e558eb35270e3cd168aed50c5aac60827f9de9535d7b82f81da

          SHA512

          9bb1237b6c63898faf75631b6b2de763f9c0c78a48e2065ef23a4e54620f7e22e28e198d589ece42484a48eff394fa9e27a86876f89dfd35db036ca046d77fa3

        • memory/2364-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2364-86-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB