Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    14-06-2024 00:34

General

  • Target

    942da28a926a40c27d6e6772bb7bd010_NeikiAnalytics.exe

  • Size

    81KB

  • MD5

    942da28a926a40c27d6e6772bb7bd010

  • SHA1

    d98a0cd03d8adf1ec12af937baa3fe24a65693a2

  • SHA256

    05cd9086acfa020f504d1e5bb74a5923995ebdc346fd5e45f05455c5d2ca248e

  • SHA512

    dea05c6dde84950ebe2355e3807a4b53f2eb3cdbce1cf8e5e51931d94258f0303bc8a1098175004eaba62395f60538747ba53fe3dab2c890b4f6553639a5d322

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8asUsJOw:fnyiQSohsUsZ

Score
9/10

Malware Config

Signatures

  • Renames multiple (3491) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\942da28a926a40c27d6e6772bb7bd010_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\942da28a926a40c27d6e6772bb7bd010_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1992

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2721934792-624042501-2768869379-1000\desktop.ini.tmp
    Filesize

    81KB

    MD5

    93f34241bb75fd3195040244b445bf49

    SHA1

    6463acf0a6b9afeed91b3d6740407ad125f7a981

    SHA256

    f1c1cf3f2c291c289ec31bdb68588a7e0bd5fd6f62dc9ecf541c9065fac8a850

    SHA512

    321292f85ab0e7a4cf236d06616ab47c653ae2b4f0ee6ab82bedc71bb3e1068128529922606a091b0de6ca66ba76b145a3e9b8c6b8b989c71aec51112c6ee9de

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    90KB

    MD5

    dacf9b2919acf15a64b54ccf7c26c191

    SHA1

    716211be893e9cba88ec5b37cb4971e407a60103

    SHA256

    5110c97173e67b5a39b4bea70a0cf561de9c1069df7d89a938d1edbcb4571275

    SHA512

    6b033ae892d5838384d265dad43abce2964785585f3902c0fd172db6fe5f3561897308b11e2616f2fe6546a9ec7ec0d1e7be052e43b44ea37c23aced4ddd565c

  • memory/1992-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/1992-652-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB