Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    13/06/2024, 21:27

General

  • Target

    886effe70b5dca28ced14cb2c5ee3720_NeikiAnalytics.exe

  • Size

    70KB

  • MD5

    886effe70b5dca28ced14cb2c5ee3720

  • SHA1

    5f1c099a726cfdc4439ca61800bddbe4c4fb53f0

  • SHA256

    c21b03bec7a6314638a85162059a5ee53c2df60d07089706e4864002a39a77df

  • SHA512

    052b0e5a73258693d38c6214745f2ec66f8edaf7bd0f179010294f4ed4cef89b94d76246ab1f6040c2ce18b2c2c204e8786a8603dd42897742454cc25a12611a

  • SSDEEP

    1536:a7ZyqaFAlsr1++PJHJXFAIuZAIuoJIFH4JIFH4:enaym3AIuZAIuE

Score
9/10

Malware Config

Signatures

  • Renames multiple (3442) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\886effe70b5dca28ced14cb2c5ee3720_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\886effe70b5dca28ced14cb2c5ee3720_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2176

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1298544033-3225604241-2703760938-1000\desktop.ini.tmp

    Filesize

    70KB

    MD5

    a4582fc233b8da942b9f141ff554c4a0

    SHA1

    a08208057046f3c8c1c37f49612782d2cb09f783

    SHA256

    f0865d9dd3061fa484ce6d6c897aa8758cee4297aebe3db6c0e45f9735d7da11

    SHA512

    30a064ad47f863f3b1dc358191402d61e7304c268f74276c46057aa70550ba7530c6ad0640493799aab8c987a4fd75d70f9a0f2041c6cf6a6d3a94984a1b9077

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    79KB

    MD5

    fe9a6d373b3b585718f179168da1cbfa

    SHA1

    00a05034c51b63272b3f4db4cb7b6c882f10a07d

    SHA256

    c77bff679a3374556490856b3619965a880f8cc99d665900bbbd6c1b830f2fd3

    SHA512

    a8ad57b0aaac6ee8f4180f2ff06ec65251c2e42a3f9d64f0f69cb44c9ba86412be97559f3cd7df34cdee0aba182c79c6b1d381dd08a15952ae3195dcd528cd79

  • memory/2176-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2176-646-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB