Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    28/06/2024, 16:40

General

  • Target

    a1459c3e82148f9507c722c27bdfc275114ad4500eff57a6f3c741f3298a6bda_NeikiAnalytics.exe

  • Size

    52KB

  • MD5

    7501a911a29403a97094493b01f5fc80

  • SHA1

    04718aecf02aad34bc03de5f8a69bc201e78d8f4

  • SHA256

    a1459c3e82148f9507c722c27bdfc275114ad4500eff57a6f3c741f3298a6bda

  • SHA512

    e8fa708d4bf4a4399bb68f6afa5dbcaaaa140408f97fd21112e9247371cdf80a3c965a1c0c11b9f775b8062c7ff395a3ce750bd813d6f4969d3fd0218713650f

  • SSDEEP

    1536:CTWn1++PJHJXA/OsIZfzc3/Q8IZCja0tnmmjfFjfPj6ja0tnmmjfFjfPjfYt:KQSo7Zg

Score
9/10

Malware Config

Signatures

  • Renames multiple (1023) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a1459c3e82148f9507c722c27bdfc275114ad4500eff57a6f3c741f3298a6bda_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\a1459c3e82148f9507c722c27bdfc275114ad4500eff57a6f3c741f3298a6bda_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1252

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-39690363-730359138-1046745555-1000\desktop.ini.tmp

          Filesize

          52KB

          MD5

          7707075c987f048658eb6d9db42338de

          SHA1

          a5de85242e128a8176a0acc49fa7c19ee3d562c2

          SHA256

          9cc7e58ca4e946f90f7ae6965c8b19baea54281af27df08b7592e78e051a34ab

          SHA512

          5590a267f7ed411676f7c0f12d2436b4b064b33a9b24fc1b2b9e004e6358d60fd22979a7f2e18f7458a47a876a2647ccd4a79d2ea670e4c1647aa8000b57beea

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          61KB

          MD5

          382fbfc82fa3b360d8797f5c74237ca5

          SHA1

          289434881c89163912ab2f4e9ad794f54dfbdf98

          SHA256

          6803f36a0b97049ca092fcb6441cc0cee4557e02336db67c52d6e90d02eb9bb2

          SHA512

          0454ee215e1ad8dc321f94a10ab6bdbf4813560b17fc2780fe9ebfda987da7ef0606c421e490f7dccb1e2fd5b9bb481b70f3a15c819dfce1dc242260da0d0fc6

        • memory/1252-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/1252-26-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB