Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    24/06/2024, 01:26

General

  • Target

    2a2bde4e9e1e685cf0987247620f1b623d91c15b54d786c94118b3c727f0b3e7_NeikiAnalytics.exe

  • Size

    39KB

  • MD5

    b7025e506785aa150e0cf2f3959eb000

  • SHA1

    98dd9b9ef67b9c2d54a544372fd864b083556ffc

  • SHA256

    2a2bde4e9e1e685cf0987247620f1b623d91c15b54d786c94118b3c727f0b3e7

  • SHA512

    250a4b8bd084bc62e0eeb4b8201c816e653d1f893da5549c078a981053f2dc9202cc6c46c742e085930e4c24925ba72c21cc8d637b0314fd5b3cb3f85653ffc9

  • SSDEEP

    384:FBt7Br5xjL2Kd5AsAoh6n5eaOlIBXDaU7CPKK0TIh6SjeYDTcYDTii:V7Blpf/FAK65euBT37CPKK0Sjki

Score
9/10

Malware Config

Signatures

  • Renames multiple (3815) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a2bde4e9e1e685cf0987247620f1b623d91c15b54d786c94118b3c727f0b3e7_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\2a2bde4e9e1e685cf0987247620f1b623d91c15b54d786c94118b3c727f0b3e7_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1868

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2737914667-933161113-3798636211-1000\desktop.ini.tmp

    Filesize

    40KB

    MD5

    159c39c80cc636af624b5b8eb34f1d9e

    SHA1

    76d34f7985e9acc86f5ebf7297dd64d895dbe4e2

    SHA256

    338cae2d8a65aceaf50d39ae4f2b140996ebdc9fcd9dba8d6fc1bac399fb4f6c

    SHA512

    3fecdc86875b482c495dd7be5aa7dad139bb44c320346b4075274a0069acc8c6fa9db1b98e02f1570e15e7f5444309fd8e8bc153ff1189bb3023867aea4dede5

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    48KB

    MD5

    619646341d7de18b7e9cd56bbd403ab8

    SHA1

    df0ad23c541fef9e076bf9fedfd06d4c5c2e4708

    SHA256

    65dcffb01e9c356a885c3b06c50a66e9809a7bd4660dce973620091ada0e8b6d

    SHA512

    8722a0536df6ed0d01877d84c833166eba8dfb58d252a474dd2bf3780dfa86e57211ba6137890b22cd6a8ba3b3aee692d808a99df4391e35cfec40905a31ffa7

  • memory/1868-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1868-664-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB