Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24/06/2024, 00:07

General

  • Target

    217b2723094d86568eca442479bcddf91c2998f3055bcce3236f37149315af61_NeikiAnalytics.exe

  • Size

    10KB

  • MD5

    c53a265d45ac8139ab770cf2263b3c40

  • SHA1

    087113727cf990ce21ed138c3a6712694ec1418b

  • SHA256

    217b2723094d86568eca442479bcddf91c2998f3055bcce3236f37149315af61

  • SHA512

    15975f3db080e7fcf48202119c7bc35ecae4ed569704b2605f8e42fb3986a3dae24137599ebabead2ac760a80e16ce05152b741ce2a50ce63404c749cbc4cf35

  • SSDEEP

    192:QOlIBXawRUU7UKi45I7ZwKIwCTIhnyLPLS:QOlIBXDaU7CPKK0TIhR

Score
9/10

Malware Config

Signatures

  • Renames multiple (4111) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\217b2723094d86568eca442479bcddf91c2998f3055bcce3236f37149315af61_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\217b2723094d86568eca442479bcddf91c2998f3055bcce3236f37149315af61_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2328

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1298544033-3225604241-2703760938-1000\desktop.ini.tmp

    Filesize

    11KB

    MD5

    a4921cf76c97ccab4c642372167e331f

    SHA1

    29cbd47ad1ed28a8477847d59544bc79da3230a2

    SHA256

    be1352d2cce7b3cfeacc878fc024a87c0b41f192c0d05252b74ec6e8c26cd03a

    SHA512

    c3a16b9256e51274f0dea80af3ded86a2d593b1f7b769b605bf2532f48f2a3f7fc42033f0e8992baf60d8e9d32c0e163fbc7702f8b864e9b49ddf2bed8857049

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    19KB

    MD5

    1bdb2bc03a2150e67109d097c5adf9db

    SHA1

    5a1cfb6a43a69bb75190f04350c9071f2f9f0cde

    SHA256

    c7cdd271711b45956be88cf8ba1b51d417b073d4d270687340a4d332cbfad381

    SHA512

    20667262bdc243cd3bd3e256aea4694c211e7a039cd6412059b1109fca2d2feda973cc6dd0e5a7b7af499c4d06381e05ea8a0c4633f982d274f2da4c989a4b1d

  • memory/2328-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2328-76-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB