Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    08-06-2024 15:13

General

  • Target

    a98d918e4b175e1b94c093741da21e10_NeikiAnalytics.exe

  • Size

    65KB

  • MD5

    a98d918e4b175e1b94c093741da21e10

  • SHA1

    30318cb908487b0fbd69b31526c765380c65639f

  • SHA256

    5e7a9028cbcf17d359b081ae891cbbd12aa70a29c1f472b082353e7967823337

  • SHA512

    0b6009a202120c32a1ce95fb65f79253bd982993c1f58574482598d2957a4ad3c1bafe7957fdb5f8387172556c68a7ebf3cd528723ca9f8afe3ae5d17d6795c3

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8J:fnyiQSo2

Score
9/10

Malware Config

Signatures

  • Renames multiple (3521) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a98d918e4b175e1b94c093741da21e10_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\a98d918e4b175e1b94c093741da21e10_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1636

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2721934792-624042501-2768869379-1000\desktop.ini.tmp

    Filesize

    65KB

    MD5

    710a19f4886ba6762af787f5616ad651

    SHA1

    c398495b53eb4901ee01b427c87c9a146f82f35d

    SHA256

    2682bd8dce5ba42c132399fba7f2cc5ef48f4896a7022e60450bf8d3941dbd78

    SHA512

    a714eb75f379b5fba8533a1b1fba1c575e01805d86cdfa8e6c5643f7d596fb37db116b2cdd4fc41a7d7cb7f39da7ae7c094e6643c31b8367738dbcc0fc961eca

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    74KB

    MD5

    6ec275029d09c1d965e9e92d9a6a6af7

    SHA1

    74d0ebae2ce12b973b7d7b04027e3a0db98543a7

    SHA256

    0a46372253873d9c04e01ad53e3a20e0468b63f137770fbf219352913b8478dd

    SHA512

    0867053ba0c4fd74a494921583208d23bffc1b2dcb0a99e900484b71971d1665cb250c311355c1590223e747935d7c92c2b92b49574f60ee38fdf18859282872

  • memory/1636-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1636-648-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB