Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    25/06/2024, 23:59

General

  • Target

    27b4dd0bd9e920620e273124db880b4f6b8c04d1e377eef39eafe9425d2c7d84_NeikiAnalytics.exe

  • Size

    70KB

  • MD5

    fefbdadea6bd01269b067e6d893de140

  • SHA1

    6940f85edec74d2bcf2e755154c81d2682774eeb

  • SHA256

    27b4dd0bd9e920620e273124db880b4f6b8c04d1e377eef39eafe9425d2c7d84

  • SHA512

    6396d8ec1ab2e7f3bfab55612a89fc1f8e94282bbcc65554df1eb94974764937c82186583eada47a097057ebfbc6a6e6f6e67af51046c6b6669b180b19e8e1a7

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8Oyd:fnyiQSonyd

Score
9/10

Malware Config

Signatures

  • Renames multiple (3749) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\27b4dd0bd9e920620e273124db880b4f6b8c04d1e377eef39eafe9425d2c7d84_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\27b4dd0bd9e920620e273124db880b4f6b8c04d1e377eef39eafe9425d2c7d84_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2084

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2737914667-933161113-3798636211-1000\desktop.ini.tmp

    Filesize

    70KB

    MD5

    43c8abea1e50b05e3ad672a6f4adbf7b

    SHA1

    411ec475afdd06a711e2510845c86ed7ab7155c9

    SHA256

    0eec2eb058d90ff4c08a043ac6e1bd6c63fca30eec2441741614f0b85d04feb7

    SHA512

    e567f910ade7cbb68c011ae14c5d784aa13de994cf0a8f620f0b05c02662123e29c840591aafe3ed8e983489d7fe4b5685244fdef89941d5fc22414392688bdd

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    79KB

    MD5

    3eda7c3bcbed8b13fee21525b61ca688

    SHA1

    ed3e4ec9de0373ee36c8c637e0089b996f42e5f4

    SHA256

    5ffcef3efab969307c54e5509d5a50de984dd341d75efabd5c51a79dc3e422ea

    SHA512

    236b2e4a2f95bf0e20a80245ebea6da572d82eabcc7647c1f7468e37d8815b311c1c86401a37dd96169ef847ae6cd7205c395dc313c73ce98bdf8dfe4dbd6e20

  • memory/2084-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2084-650-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB