Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    20/06/2024, 03:03

General

  • Target

    2c9bf4eb7f2002b45f9d5549eb6cacf127f128d24c9e782a8ad4b22e6ebb54a6_NeikiAnalytics.exe

  • Size

    171KB

  • MD5

    9d58798895cb10b36df51ad705884990

  • SHA1

    3f4e830e8528ab9d88db7c95f2149137b66a68af

  • SHA256

    2c9bf4eb7f2002b45f9d5549eb6cacf127f128d24c9e782a8ad4b22e6ebb54a6

  • SHA512

    0c54e1e3002d12070bbd50c6462a4ddc74e39a87168bfecb60cc499841ab935ed740119367a76cacb48f5525456079f1dfb2793f2d76c1d4b92d494cdf51f392

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q89r2NpJYHdjotnE+WRkAlUrk6Y:fnyiQSofPOdjotAR2rk6Y

Score
9/10

Malware Config

Signatures

  • Renames multiple (3407) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c9bf4eb7f2002b45f9d5549eb6cacf127f128d24c9e782a8ad4b22e6ebb54a6_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\2c9bf4eb7f2002b45f9d5549eb6cacf127f128d24c9e782a8ad4b22e6ebb54a6_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1812

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2297530677-1229052932-2803917579-1000\desktop.ini.tmp

          Filesize

          171KB

          MD5

          a18d704dd0e965ea67661497834c01d9

          SHA1

          d083994d8d3e3b6fe51316f4f13c068b3ada472c

          SHA256

          030eed250cb86eb13d51a0fcbb9dbcda4049c69f090155ee56800babdceb725d

          SHA512

          01b1f02432aa1507ba18b232226ed46a2df11d373213c6bc8d6f49549a142052be245ff7e7ce5612f74926c7882419b7b521e69e03bb4eaabef706f617461a09

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          180KB

          MD5

          7d74c9ccf2df67e9b2d4e5cd7bff3f32

          SHA1

          45e22c5803a6dc77f79ac3a56ed80ce3921e83ec

          SHA256

          b3d46644d2a39f8122d44731e24aa610c4ade6d680e001520a146860101892c5

          SHA512

          1b0c42a0fa1a50187e70337141c0e48f4f99e708fa32f8dcf4a0d27c3153ec8c66bf95c0d8d822784d3742f1873c96ad9cbe2fba305f0ce2367e124baab3c83f

        • memory/1812-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/1812-648-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB