Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    28-06-2024 21:58

General

  • Target

    222048604e47fdc10765eaa19e0ec18919b8ef258049291abf62d0d9cbc407dc_NeikiAnalytics.exe

  • Size

    72KB

  • MD5

    9b676ff1ef95665f8e90d60f6b2aab20

  • SHA1

    ffe51ac99a7809d3f975b7a82d60b97910c2f0cc

  • SHA256

    222048604e47fdc10765eaa19e0ec18919b8ef258049291abf62d0d9cbc407dc

  • SHA512

    d0117b2bec39a824fccebef1c22a8d98d34bf905992cd060425fb43af150ecf436cc7c9e6ef6b994a882956a2a5a0cbdfabf45143d4f5bc8b29a41390e1b63a0

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZBX5WX5tWIW4:+nyi4Mef4

Score
9/10

Malware Config

Signatures

  • Renames multiple (3656) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\222048604e47fdc10765eaa19e0ec18919b8ef258049291abf62d0d9cbc407dc_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\222048604e47fdc10765eaa19e0ec18919b8ef258049291abf62d0d9cbc407dc_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2020

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-268080393-3149932598-1824759070-1000\desktop.ini.tmp

    Filesize

    72KB

    MD5

    8b8bf23c5eec96dbfb5ccff860909a9e

    SHA1

    0bfa949a5581f994b9dfc10a051da202550cd4dd

    SHA256

    2ef9c4d5f5e8453beded0931fa17c59008b26d8d8d6e3c08eb01ff614ce12338

    SHA512

    d615899821bfdc4d6c76e9f55dcb5896f73a4a57d94f48b224a38fb1011c2ac146473fe787d87944dae2b12dbf95447dfc0cb30b0e55e393c2cd223914d839dd

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    81KB

    MD5

    bb2134b981a30fb74d35a9449698efaf

    SHA1

    6d5bb95074b62b38d0a705b5b8ae51ed84c7f642

    SHA256

    83e6ef72efae6d8ae1be9f744f160a31eaa5e09ed92e3079203bcff58e71661c

    SHA512

    1a4670c16f0d48f6aed386a0627382fd19452f57c23911bcb413b96b379bfa1cce5b80ff3b44b5ceda4527b852b2b09139f50fdd0b0251b217d57ae9137c3b10

  • memory/2020-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2020-646-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB