Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    20/06/2024, 03:17

General

  • Target

    2db675951dc7df54ca5e94b8b54d130af430304fd5e87f30ef8492d65f3a67d9_NeikiAnalytics.exe

  • Size

    68KB

  • MD5

    fb4c984bb49271ab047e1b4dcc8b5bb0

  • SHA1

    d49e34c25366022bbe10282aa242dc41d25b96ba

  • SHA256

    2db675951dc7df54ca5e94b8b54d130af430304fd5e87f30ef8492d65f3a67d9

  • SHA512

    dd3bcfe855b4736692aad7f19eb6d1e0385a9f5c68a45e027a47eb1d412ea562585c979b68302a75b02f84f5c5d2ea5ddad8547da64763033373e5cd248ca063

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8MZ:fnyiQSoD

Score
9/10

Malware Config

Signatures

  • Renames multiple (3696) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2db675951dc7df54ca5e94b8b54d130af430304fd5e87f30ef8492d65f3a67d9_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\2db675951dc7df54ca5e94b8b54d130af430304fd5e87f30ef8492d65f3a67d9_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2856

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2721934792-624042501-2768869379-1000\desktop.ini.tmp

    Filesize

    68KB

    MD5

    6734af03a64eaaa771a5cc8fc570c39b

    SHA1

    61a0ebf662e0db5ec4ba8f12d128892004b37e16

    SHA256

    24a30a774d93f137c35e3ba41d0872bf0addc1d62a6699979d9404f26a375173

    SHA512

    a8e6c99dc3edd31a35af8a8c04e89685fcba87c28dc413ad00a7053ba869f2e0f27a75e4960ee8453b82980925037b8a6f989b070e89848325dbb0153385238d

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    77KB

    MD5

    df5a2c1f048c5ffca24ee5e98357cb57

    SHA1

    5d900b2bd77b3e9678cb446fde0faa26936a14f8

    SHA256

    f7a4b61621e90a85114596cbd7f1396463e7ea6b3bc49310e6faffa0deee87f7

    SHA512

    ce607f31c898b0808c7e19d14f09b41265a5b592551cf2faa5b430d9c3721b4718326293c5f263c906330d8e7a2f2d7f085b11e258e6a3c0ba212ddb922283f2

  • memory/2856-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2856-650-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB