Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    14-06-2024 09:56

General

  • Target

    b6127ac6c5c7e1b71d152075bfe8d3d0_NeikiAnalytics.exe

  • Size

    89KB

  • MD5

    b6127ac6c5c7e1b71d152075bfe8d3d0

  • SHA1

    bd05e884fae0d6770899ceabe1092277b8ac911c

  • SHA256

    eafee3fd0dd98a9113a71807aa25e5468d3a15e012cb8a988c6d1fb2eb827a48

  • SHA512

    43f00f160b2fa9a6bbcf8a08b3c1b968fa333c113057d16d6e281e9684cb7839639e7394de2ed7828eb206ef09299734ce941173ff2f894d4896e02a850346bc

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8asUsTq5q9BVI2IA:fnyiQSohsUsWU9BK3A

Score
9/10

Malware Config

Signatures

  • Renames multiple (3477) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b6127ac6c5c7e1b71d152075bfe8d3d0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\b6127ac6c5c7e1b71d152075bfe8d3d0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2092

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2812790648-3157963462-487717889-1000\desktop.ini.tmp

    Filesize

    90KB

    MD5

    ce4b3c3e1052d1e808036fbc9d1f7677

    SHA1

    85a3cd376492271aa26419b85be778bf06fba536

    SHA256

    5a91c62329889803a3391082b11541321cbbce89649ba021618e17727fc3ff82

    SHA512

    a4e90484368ae9ca4073c7f94d6bd01d4800a78725df45441ac13d58c8761fb9ed8e0645d645c0aaa449d7e72f7ac2f06311fad7b753c5681d9f1755f5a3a6da

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    99KB

    MD5

    36596de9fc47097eecba6ef3015da1fc

    SHA1

    1efd082725ffba43800f16a4febed1d596a3f389

    SHA256

    09609c88ea861191785f850eb1aa7260ef63200357429a6d6c3c786c95e57bce

    SHA512

    f620828a0d5f8d43449d1c3c1417de57a29a78dfb0923685d769604a93f8873eefb765bbbeaba12eb158f0bcc1986e0aad5c29c4947e3c58a57fb8e1927eb7e0

  • memory/2092-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2092-648-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB