Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    29/06/2024, 01:35

General

  • Target

    46a1cff6d7955b6e9fd1ae59beb0b9c4f354c43ef6facc0a2b9875a8611cfe38_NeikiAnalytics.exe

  • Size

    73KB

  • MD5

    3df805695a5411e32d108eabd8baa6d0

  • SHA1

    d46a535120d969deb72d90a0d6ca6b57251e67a1

  • SHA256

    46a1cff6d7955b6e9fd1ae59beb0b9c4f354c43ef6facc0a2b9875a8611cfe38

  • SHA512

    b35016a6f46e061c4af04b51175db91a8cd829ab7ecfc1abe8846afc7fdcd4050156744050354b286498b7a13081095d9b68e6f4699c0bb30ccbaa79beb632ba

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8IZgE0:fnyiQSo7ZA

Score
9/10

Malware Config

Signatures

  • Renames multiple (3680) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\46a1cff6d7955b6e9fd1ae59beb0b9c4f354c43ef6facc0a2b9875a8611cfe38_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\46a1cff6d7955b6e9fd1ae59beb0b9c4f354c43ef6facc0a2b9875a8611cfe38_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2920

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2297530677-1229052932-2803917579-1000\desktop.ini.tmp

    Filesize

    73KB

    MD5

    6fc7ac5b59f3e79ae1997c9e5303dfde

    SHA1

    a9b3fa6e4315486081c7923641cc3c76f78513e4

    SHA256

    fbacbf9f98c6cba8395bc850333c14ab02866565c5c8b1494544c248fd257548

    SHA512

    c276afd73aa93b4ae5ab39817ab9046518c8631af019a882963dfe1b83e1b8df291ce4f31c307aeb649cafab61ab12c4d60811da012cb6055f3ca18d16994dd9

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    82KB

    MD5

    7436b5d0d88c697b97045446666743dc

    SHA1

    0627fe1f7439dd00255d430205bab991089b8721

    SHA256

    acaa9699854483451b6c360ff97238efdce0d14eed63c2694e999fccc8e3bff4

    SHA512

    59c9246799f5cdaf147b6924fbdb8ae5141656f5dee3f098e13568580b86b6889b2b1394d19c0bea90b6a2889786771de1ddc2fdbe1366e65a2e0db427fa4120

  • memory/2920-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2920-654-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB