Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15/06/2024, 23:02

General

  • Target

    c11a055e172157ffb6d166de28dba530_NeikiAnalytics.exe

  • Size

    44KB

  • MD5

    c11a055e172157ffb6d166de28dba530

  • SHA1

    96b697eca98543da4f52657a87b02688e688208c

  • SHA256

    0b27b9de4c585983ef417a0be1e7db8e0b1c6f05b3be26245bb92479851a9bc4

  • SHA512

    2cd6f8cceba8935a04e616bd165a39b9b780068671a31b5b4299b9ce488f40d8161b0d48e0eb49e61bd3f89846e8ea85c7f62020fcfacb869e77558a4e6ef8c1

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAF9f:CTWn1++PJHJXA/OsIZfzc3/Q892y2a

Score
9/10

Malware Config

Signatures

  • Renames multiple (3718) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c11a055e172157ffb6d166de28dba530_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\c11a055e172157ffb6d166de28dba530_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2324

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2297530677-1229052932-2803917579-1000\desktop.ini.tmp

          Filesize

          45KB

          MD5

          7aae2f8259efb5124e37cb12a68c226f

          SHA1

          a23e342968607d5e80b4407a18f815185668208c

          SHA256

          f337c4b713f2c3e355c01b330ab5dcd47349abf03bebe8222da3290e40dee734

          SHA512

          43b86efe388e9bafc13da238074fa4561ffc7fac701eb087370d21876fdf9d73ae1a4abfef16fcbb6d8160db47ebfeb464c2b47673a87540a683399cc2d7afb6

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          54KB

          MD5

          2ed43d41bb0f288a2d3a80c9232edbd4

          SHA1

          4ef0369df633f42bb20afb35ccded58eeb00cd0f

          SHA256

          3a87bdaaaae166713e38917fa44d7de09fd27552fa4c8b882f18902f36ef79e1

          SHA512

          b3c8e9306de311096d331dc8f03f914e3b82781b2f7337b2c1b7b091e520dc12bc0bbdb9d5b4d684d55d2b9a8ad75bbc6ca458f7424b68ea421b24e01e2df24d

        • memory/2324-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2324-76-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB