Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28/06/2024, 00:31

General

  • Target

    4c551ba7016f7b146378a8f6b11a53982d909779809dd0de1a72672f9e5e14a1_NeikiAnalytics.exe

  • Size

    91KB

  • MD5

    0f9cd6f1d9ac34f091eaddf8e6a0acb0

  • SHA1

    28853b6d45fb16922885c5784c937ef87ffd9349

  • SHA256

    4c551ba7016f7b146378a8f6b11a53982d909779809dd0de1a72672f9e5e14a1

  • SHA512

    dd7e83c289df311134f4e7e86b14c31c091d912a91d4e39f3d8add5d1da45a941a9a529ee5168f0aaf0918950f39ba14cadbae6d513582698bec10deb49e1e7e

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8asUsTq5q9BVI2ImLPLTa:fnyiQSohsUsWU9BK3mLPLW

Score
9/10

Malware Config

Signatures

  • Renames multiple (3493) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4c551ba7016f7b146378a8f6b11a53982d909779809dd0de1a72672f9e5e14a1_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\4c551ba7016f7b146378a8f6b11a53982d909779809dd0de1a72672f9e5e14a1_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2384

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2297530677-1229052932-2803917579-1000\desktop.ini.tmp

          Filesize

          92KB

          MD5

          fd04940cf860eba7dc01d13afcee8cde

          SHA1

          5c6cbf7da1eb5ba72dac7fc0e996038398374e93

          SHA256

          b7bbea058beea17fd0c9874bce7931b308b53304e76951b384cdd928645fc578

          SHA512

          3697d18470697b738d21588a339c3a10b9da44d7477483fae5298a3c73ec9f7c368877cedb0c918617c5b17f7d4a13c60d8de899e15e8f9db48face87d6b2381

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          101KB

          MD5

          40a7e8756ab04d6f4585a2768811f592

          SHA1

          c08aaae8571f9275541d89bc831659fd659899d0

          SHA256

          02dea076fed96b462eee0a74c74180e07de5b4430b31eeb7150e80ac66a54293

          SHA512

          10abc0fb93badf2bfb91f8be570d4c99683b6f4e36008b8308cca7915e3be95318d9572239760a2a7859ab93e8e9e72f2afa9310bcc7495a3cab2f29783b4291

        • memory/2384-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/2384-650-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB