Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    28-06-2024 19:42

General

  • Target

    a856066793cd2cb21dcea9afc76b6ebba977f91945951894ff21b2b942891f4e_NeikiAnalytics.exe

  • Size

    77KB

  • MD5

    dcace620af6e3239d6e1cbeb82296890

  • SHA1

    667629adeb6924619c5ba5372283b28c659cfc58

  • SHA256

    a856066793cd2cb21dcea9afc76b6ebba977f91945951894ff21b2b942891f4e

  • SHA512

    81b08ead5b5ac1d103478c2f6eac7e7cb8332559999314519b78cbd6a8cfa58fdf0f2e3946e86ebdd729be7eb34711915a3b04f62964d886dac98df5ecf9ebe5

  • SSDEEP

    768:a7BlpyqaFAK65eCv+cIA0fm7Nm0CAbLg++PJHJzIWD4adZdhAIuZAIuniX+puSs:a7ZyqaFAlsr1++PJHJXFAIuZAIuYSs

Score
9/10

Malware Config

Signatures

  • Renames multiple (3747) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a856066793cd2cb21dcea9afc76b6ebba977f91945951894ff21b2b942891f4e_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\a856066793cd2cb21dcea9afc76b6ebba977f91945951894ff21b2b942891f4e_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:3032

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2721934792-624042501-2768869379-1000\desktop.ini.tmp

    Filesize

    77KB

    MD5

    fe352f37dd53c73c20b64d388727b818

    SHA1

    dec714ed96b23c815416a8b6e182c6c83efab232

    SHA256

    580a96e9c2083c5f79e4838477accdde8d99f5fabc930acd6bbf5d2e3de0178f

    SHA512

    4316baf972e28f4e534d326a78206a03e2ccd36d092004c2ef5aca0aa3ec01454ac28bf93afb776ba8f94a27d02d46d940009c5715440bceddfffbd21ff8d841

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    86KB

    MD5

    b8b432af6848b46866de7f96f5d7fad4

    SHA1

    7f460e28b48ca65f231f12d6de471610ae892cf4

    SHA256

    ed291449f791b3c1ef3ff421c50f708297248f0a5b58f10582c14018fca5323d

    SHA512

    d51213c7a246ce87b99cd1a3ca883da9dada649ddbb27510781bd4ea62e9256c2aa0cd09b9e74a32521bf1b6df2a071737fdd8ca35fa8ea2d521469ffaa7f580

  • memory/3032-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3032-654-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB