Analysis

  • max time kernel
    149s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    24/06/2024, 09:06

General

  • Target

    5ba12fbf0d7d1e3da743605b97735488350489b979c5ff221e7f68d767aa33e7_NeikiAnalytics.exe

  • Size

    80KB

  • MD5

    d2559c85eef55d10438108d6ba4165a0

  • SHA1

    e94df08f1851a579e0eeb439913dc6d9df5b8c0f

  • SHA256

    5ba12fbf0d7d1e3da743605b97735488350489b979c5ff221e7f68d767aa33e7

  • SHA512

    ce31b6e2f19ddacd636f820161db04ab92aefdaab15bd70f70edeec3a50a22f64dbe9e59ee1152aaa6054e8fc29080790172b1a4416a42f7f0273b920eebec06

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8zxq:fnyiQSoj

Score
9/10

Malware Config

Signatures

  • Renames multiple (3502) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5ba12fbf0d7d1e3da743605b97735488350489b979c5ff221e7f68d767aa33e7_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\5ba12fbf0d7d1e3da743605b97735488350489b979c5ff221e7f68d767aa33e7_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2360

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2812790648-3157963462-487717889-1000\desktop.ini.tmp

    Filesize

    81KB

    MD5

    5e6e627f2ac910d3015152cd11707d33

    SHA1

    5717c6085f5156598988d42c79d344de178e43d6

    SHA256

    c380b344b58194b66a2fe86ba349c6691ef180e8fe3881a05c97241d0d564fad

    SHA512

    f8483507dca764c6eb55378972e65a15753e5bae946edcd427af4a8a51f6e4c037b43a99dec08e2ec76489a69196762f108501de49fa32fda0680f234f8828cf

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    89KB

    MD5

    57979b84722c718f36729a2a3c17db99

    SHA1

    f0a9e1467465b89b55a852bd046ed8cca0925f31

    SHA256

    f4472da491cb6c8a5f410fb63fbc993d58b533747fee6889246e7e1600e1edf0

    SHA512

    95521e55de81b11bc636e705d95870ba4dd129fcc6cb3b82adccdbb0aa119a5f7ae381ef2e3cef54b68c6e0eb2c9711f759f3278fc3dff3ba07019670fcf67fa

  • memory/2360-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2360-656-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB