Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    16/06/2024, 03:09

General

  • Target

    d061593923c8cbdb33cbf4e795d1c9c0_NeikiAnalytics.exe

  • Size

    60KB

  • MD5

    d061593923c8cbdb33cbf4e795d1c9c0

  • SHA1

    0af6b3215131e205f904372fb92f07865721a855

  • SHA256

    738d0d9c00849118a506d7fdb8723329b7d7c8b06281e20bf9ed94137d26b2b1

  • SHA512

    44957d3770d69d55e7dd04e74245c671e717ae1a7f9bdda2ba320ad82939a3447272abf96629dd8e7e1fcaa48efc69b9cfc962497219762aec7a6dc7e5bb8b1e

  • SSDEEP

    1536:CTWn1++PJHJXA/OsIZfzc3/Q8asUsJOLKgyKze+yKzed:KQSohsUsUKfKzWKz4

Score
9/10

Malware Config

Signatures

  • Renames multiple (3741) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d061593923c8cbdb33cbf4e795d1c9c0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\d061593923c8cbdb33cbf4e795d1c9c0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2252

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3691908287-3775019229-3534252667-1000\desktop.ini.tmp

          Filesize

          60KB

          MD5

          1fa4a1b4ffd86fa104980e7753834971

          SHA1

          bd710fbb690b7a28abfbe5d3c24ccc7572e4c9d9

          SHA256

          7fb9ec44fada0f850ecb5cfa51fbd2329f9888f4d5c3985e912db121c10d1e3d

          SHA512

          73e0fb114c175d198941a6407d51f21e4f7efa8a79663633b7863160be1610daebaf22e3041fadd32c238e004499494b5dd384f6248884e9c089ad3a97ea7ba3

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          69KB

          MD5

          59df0f420553c895f2565baa869d9a91

          SHA1

          f704e7fd21ec2f34d5955e81c091922fe3cd6550

          SHA256

          9c60a9e4d3c262cae2235f347f4e2145b197b8d70dd114a3c88f23ce4449536a

          SHA512

          342c239a72cf5eea123b8c00fe875e56623954c17ff5f2eea60713484723ebec5e93505f4adf025a45c3a5c2db79344ae3ad2af68d99a13fae6ab223e3df8963

        • memory/2252-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2252-86-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB