Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    08/06/2024, 03:35

General

  • Target

    8830a75d4734c153cf60d0ccf56b85e0_NeikiAnalytics.exe

  • Size

    1.4MB

  • MD5

    8830a75d4734c153cf60d0ccf56b85e0

  • SHA1

    918c57e4fb0c3e0d14bb247498c0851ee6361672

  • SHA256

    112f5e2db80deefe0ff4cd6b533e35d86583215da9fa9ba3022720becc9fcfd4

  • SHA512

    8fa663eec63b1407fa7dfd759f49728395549fd0db0b6308169017618b3231fa025bdb77cd4acb9716c2683cd45ce04c7c1f64f5e192ca51bef8f161fd113c7d

  • SSDEEP

    1536:V7Zf/FAlsM1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSC2:fnymCAIuZAIuYSMjoqtMHfhfagT

Score
9/10

Malware Config

Signatures

  • Renames multiple (631) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8830a75d4734c153cf60d0ccf56b85e0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\8830a75d4734c153cf60d0ccf56b85e0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2944

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2297530677-1229052932-2803917579-1000\desktop.ini.tmp

          Filesize

          1.4MB

          MD5

          ce6df6d165803b5676db92673004ff1a

          SHA1

          3cd888fe6e10f462bde666117b5c1fbad9ba9140

          SHA256

          3e73bdbac9886577ffd4a6f69e21d24a7cb18dbfc393bb06ec69ec703b6c3b8b

          SHA512

          615e2edb5b1336fe5a91e43c81386649e818bdda29e959361fd955ce293026004c5cc207dba74ebfa4377feaee4496dfcd7c2d1d2ed7ea583807d90858c06a1d

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          1.4MB

          MD5

          576dc0c41c74f3d1356b4fb698dded63

          SHA1

          3eed8607cb27c417f3c7e927274c0125cbd95cb7

          SHA256

          9de203e74f03804ba2e5665e9116abce6cfdca44ae87df92b9f066babe0cb653

          SHA512

          3dcfa1ebb3563d03bd2a21edf6943d4436ccb44c0bf412ba24457948b662c319041af5c452ab22307458f61f64c31c24575e12e419a635376bc32b3e9c521196

        • memory/2944-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/2944-162-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB