Analysis

  • max time kernel
    135s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    06-06-2024 09:40

General

  • Target

    033dae941982d93aaa04dbcc1c7da1b0_NeikiAnalytics.exe

  • Size

    258KB

  • MD5

    033dae941982d93aaa04dbcc1c7da1b0

  • SHA1

    0958b5c937bb687c99aaa0b71df11ca1956663b2

  • SHA256

    df4c03eeb4f5f7b5ecab7fbc288575a51f8a5d1b10f9952d728bc036674ff188

  • SHA512

    debf2bc6c1b40592256afcfcf026d07666621d4f42d79760341cf4f25aaf8f4a3e5512c794d33445e60ad16cf28093a514cd9171f3516cb315cdae172ea6ceba

  • SSDEEP

    3072:fnymCAIuZAIuYSMjoqtMHfhflixiBfAIuZAIuYSMjoqtMHfhflixip:KmCAIuZAIuDMVtM/rfAIuZAIuDMVtM/j

Score
9/10

Malware Config

Signatures

  • Renames multiple (2720) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\033dae941982d93aaa04dbcc1c7da1b0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\033dae941982d93aaa04dbcc1c7da1b0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1264

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3691908287-3775019229-3534252667-1000\desktop.ini.tmp

    Filesize

    259KB

    MD5

    0d5983c993dc90dc71b9d80e43de61b1

    SHA1

    33cefe48396cba51a1384b4c56fbb4fe1f8a61a7

    SHA256

    f526eb66b071c96425ab666261df3513d2aa2870a77d4d4a280ac92ec2ce8be3

    SHA512

    1c9da2c7b41a0f56d8fd795944cc3ab8f370d4617d277c1e0eb286488c9a9853e3901f3be17c11cabd6abd5f5fda2f5ecbc2a8877eb663205d8350f61b0920e1

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    268KB

    MD5

    8b2ed448e7cc0c0d724e2eed7818cea4

    SHA1

    2326c13fbd8e268b5e34a1b61940f270d9b2264e

    SHA256

    7ed64ad3d7aa2d853805f47a578db6bacf70337916222d43c89a7a5af369ecae

    SHA512

    18f81d8303f898a0090a65982674d0296dc22a9c156b362c4f8d954377f65b1c4fc92155328ff47c2b0605dc358a395f28290697f7af5f37261a35481303a996

  • memory/1264-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1264-514-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB