Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    16-06-2024 05:33

General

  • Target

    d9628f79cb304590d45f06b668424c50_NeikiAnalytics.exe

  • Size

    56KB

  • MD5

    d9628f79cb304590d45f06b668424c50

  • SHA1

    39a9f32ea4ca36383e2ca32c645eb079bcfa3e1a

  • SHA256

    59a283f7ed244d2da3786175e4fad653f0d9da7102b6dbffb3b32c406827c8ca

  • SHA512

    0ec4758f0411fafa3418aea9e626591308d8b972392dc8987381e1c71c8815470d76b49e61edf98a6d909b945282db0726cfa8a75f0f6ef25f61fce7d60febe6

  • SSDEEP

    1536:CTWn1++PJHJXA/OsIZfzc3/Q8asUsJOLKm:KQSohsUsUKm

Score
9/10

Malware Config

Signatures

  • Renames multiple (3770) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d9628f79cb304590d45f06b668424c50_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\d9628f79cb304590d45f06b668424c50_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1772

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2737914667-933161113-3798636211-1000\desktop.ini.tmp

    Filesize

    56KB

    MD5

    1fcb5482f7edc95e2c4d2ff659029256

    SHA1

    a81b30cb821f8244ddad7c91c23eeaeb8f18b696

    SHA256

    17524da3926022a5d9253451f1ada4fa4511dbebf8a1167ab75cd87dd03294f7

    SHA512

    c0cb9f02f07eba482a53c14c6521bb5a743b8892d6b42f9b9bee406ce79ba83b34570b9ab74cadc634d1778cebd91b146612ab7b0992ca3c7a1b12577642d184

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    65KB

    MD5

    b99002cdfb312d5441b4881086446d28

    SHA1

    43d46213f2f36d4fabd251c5981cf548840e47a8

    SHA256

    6bbab2302fc87bc19166b07b1f73d2863a30ad6d31ab78f462e92ce67a24e34a

    SHA512

    a3986979948e171fb3dad8376389e2092169361559d41e5cdd345b2bfd9167e0b183981c8ff26a1a00255eddf671122072cf812e50610bc9a6aeae8aeb7a1f73

  • memory/1772-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1772-86-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB