Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    24/06/2024, 04:06

General

  • Target

    3b31df7f29d0b88fc95eca4383aee8af9a9de7df5dfa678e78b8e940d0167a13_NeikiAnalytics.exe

  • Size

    72KB

  • MD5

    48ba8d9fe0ac42cd90f38077d1e15610

  • SHA1

    8abaef09718f486974db5530fddc1fe61fd04818

  • SHA256

    3b31df7f29d0b88fc95eca4383aee8af9a9de7df5dfa678e78b8e940d0167a13

  • SHA512

    b329d6bcdefdf0a71ee2ed224ecf62ee609bcc512df82ee92fa527b2668bd17d5a2003a16d73ee667b9c21f00230bcca86a7ffb18af0427db40cbbd546e9aae3

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8IZv:fnyiQSo7Zv

Score
9/10

Malware Config

Signatures

  • Renames multiple (3720) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b31df7f29d0b88fc95eca4383aee8af9a9de7df5dfa678e78b8e940d0167a13_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\3b31df7f29d0b88fc95eca4383aee8af9a9de7df5dfa678e78b8e940d0167a13_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:624

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3627615824-4061627003-3019543961-1000\desktop.ini.tmp

          Filesize

          72KB

          MD5

          9ef02bdeab0139e5b3ce5d7bd34058bd

          SHA1

          e91e1efb388f3c3f88fef3789f5eb4253ce82dba

          SHA256

          9f05e7da9106f5f8276633735e2d3ad7d1e4445a953be67ff9ee68f95b6bc266

          SHA512

          d0d31f5678a965193471cf6713dd1652562d761f7d1f89def05156b80a126a890f67c1e4b22499e12baaf4df65ccd8ad71ec0826a6ed46c9b18793280795c469

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          81KB

          MD5

          826d24eb6c0f549842fb1baa54368407

          SHA1

          8a8287de93e4e70195a586ba693a6db356c47044

          SHA256

          403f04e6194dc4ff6804fe71b9dd565f7a02f2f06738fc0312918658361b3814

          SHA512

          a09dc98196d76c9c5f546ea3609233ef662f1712917640d3cbc035f78880f36026547cbfa13a2c8903c133808483a6c188a497dd42673a6d76be1baecc3d03b3

        • memory/624-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/624-652-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB