Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    28/06/2024, 16:59

General

  • Target

    07e5725cc811558ca3e06c7e4fa0cafb702bbaff8d1d7d35d0bc47b931be1faa_NeikiAnalytics.exe

  • Size

    45KB

  • MD5

    2c34713009db832c3e7499bdfa0caca0

  • SHA1

    bf4f1449c89b752ff631c67a2bc17e94a162bfab

  • SHA256

    07e5725cc811558ca3e06c7e4fa0cafb702bbaff8d1d7d35d0bc47b931be1faa

  • SHA512

    d3777d63bb8c8b40f40d05da90bfa6216cf70d852eb1cf4578f932aafe86fd60c1a6d6837b67e6df8dcc6115839ea126c4656646d1dfa48ff806980af5f1fc48

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAF6a:CTWn1++PJHJXA/OsIZfzc3/Q8X

Score
9/10

Malware Config

Signatures

  • Renames multiple (3786) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\07e5725cc811558ca3e06c7e4fa0cafb702bbaff8d1d7d35d0bc47b931be1faa_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\07e5725cc811558ca3e06c7e4fa0cafb702bbaff8d1d7d35d0bc47b931be1faa_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1180

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-481678230-3773327859-3495911762-1000\desktop.ini.tmp

          Filesize

          45KB

          MD5

          402821bc749028a2fb7f2c8321a411a7

          SHA1

          1c6aa72d393962a8b36c9e42f0d51c644b48126d

          SHA256

          c2596fbdb6075c43eed97b097d4eb7cb6dd5e968a8f46b5356706b5620439eb9

          SHA512

          ab5ad86eeaf3cd3fcb22a21c100a85536cc2bef8081b0226ef8b16a9a76c1ed2c8e13dd1c98849eb58a9b015948441497da5e47eb9dea397597d3368cefb993d

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          54KB

          MD5

          5df88197e594cae23a6b127d3344b5c2

          SHA1

          2cf488c9ec547cd1a31f9758e0ef0190896c4a2a

          SHA256

          6be890fea30faacac91e13e545233ac4488d60589893d9f482d30c7447d6fe01

          SHA512

          9358b62e5ee503151021a61e5c0cb98b536b75fe6d2590a6315b79b5adcd6f1acad0b3d3a40374b53a88ac4004159e7b1393b6a2e893c1cc9ba18a29aa266672

        • memory/1180-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/1180-86-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB