Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    20/06/2024, 07:59

General

  • Target

    47fa87a80f58c616ec0f7d8bb3ca905d9b788eeab797d715db8bf2dfd188800d_NeikiAnalytics.exe

  • Size

    1.8MB

  • MD5

    69a7c18e05a0b49ffb3a6fbc4c9ceac0

  • SHA1

    29a612312ee8ff3e505883f01fcddd3d136db5c2

  • SHA256

    47fa87a80f58c616ec0f7d8bb3ca905d9b788eeab797d715db8bf2dfd188800d

  • SHA512

    799b4fcfe575d778240a1a8e8264fafe2f96a0384c80b7db038e44f5faeb345f329871f952d69173b81e30a32d613cdf1c3ee44ae00e35d1d43d73d7abff770e

  • SSDEEP

    12288:VQt8GwtIR0XEybX/aqvHIzckUPPyiwRoVGwhGARqOO:VIzjR0Uy7/XIzck0PzweFhGuqOO

Score
9/10

Malware Config

Signatures

  • Renames multiple (371) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\47fa87a80f58c616ec0f7d8bb3ca905d9b788eeab797d715db8bf2dfd188800d_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\47fa87a80f58c616ec0f7d8bb3ca905d9b788eeab797d715db8bf2dfd188800d_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1660

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3691908287-3775019229-3534252667-1000\desktop.ini.tmp

          Filesize

          1.8MB

          MD5

          c8c8ba9772b9e40fa39d9c4110738c9e

          SHA1

          6fc20df3c06682ef25e4eb0335414f4a9dc7d8be

          SHA256

          8241eec0b95ceb32d2cfc970712bc96bef17e1562a277846d335e6ab4a839f0a

          SHA512

          d65c5e63cb58fcc994ecd1f2ad1010aa8653a5fef86b93d2bf5803cdb7978e574cbad5c8e59004fe6c0ccf03dc4ab3aa32b44bf237a8e45228baf075e1d2098e

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          1.8MB

          MD5

          a0ad882911173a557f4b2e2af417e01f

          SHA1

          868f23cebaa00c1217bb37e60c83e76cab2f2e93

          SHA256

          4f9c77447cff4217b6a644d9d4a6305dcd42ee43e4845a844460fd0c26d3f96b

          SHA512

          174afbf6246eddcf3c5a9408002a76b8cbb804031bd1e43fcfee6964e20739815ea91e788c6c816d4fe8395c59087ffa52020fd1f3aee0275e9b9e861db7a090

        • memory/1660-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/1660-160-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB