Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    14-06-2024 00:10

General

  • Target

    926540966292571282bedbe21df70780_NeikiAnalytics.exe

  • Size

    82KB

  • MD5

    926540966292571282bedbe21df70780

  • SHA1

    c44c699ae33fc7e7d386a7d291d8dba4ca309580

  • SHA256

    69314876d09887ad6b6a2612fe21f0f11d9a9381331ab62f7f8b444cc133e8a2

  • SHA512

    9ce2e6d73e50e8b9440fe3987d0e3d670d7d4e53a39f4dc1ce85cffc794cb6fe06479e6320c8652c1e64d03a0653eb1d40caa3b1b111054f371048f791b69d58

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8asUsJOJ:fnyiQSohsUsU

Score
9/10

Malware Config

Signatures

  • Renames multiple (3455) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\926540966292571282bedbe21df70780_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\926540966292571282bedbe21df70780_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2172

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2812790648-3157963462-487717889-1000\desktop.ini.tmp
    Filesize

    83KB

    MD5

    10f0588732d89f7a753a9738aababf90

    SHA1

    f2568d06346ac80a47ce63d6e3708f2c2f9b45e0

    SHA256

    38879148d387d3c482b3ed5f6d2cebe7421d6e8c74bdab9ae41b69d05f5a6150

    SHA512

    1cf5f67850087410899ef74660c322c55085b968fc2b1399565417b350580c0dba217ec66ff2ad51c4bb975914e49c809af22f031a81f7ee71b9eadd356e822d

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    91KB

    MD5

    d32f6e4e26b98a03c0a6d789c03bdaba

    SHA1

    3c7d7f840c2e662a0f178ff29ae7519059d49aef

    SHA256

    842d4339a3dd9924d59b3696f10c4f4255ba08c7c50d9c1140eae8b0ca9744ce

    SHA512

    c7b21d905fec8463266a1681cb493d8d9eccb1328c6c48e42131642adab72ca208fcc8f6616fb8c5afede3fcc181c4e425f06cb8b0bafd16a46f02004de59188

  • memory/2172-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/2172-590-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB