Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    29-06-2024 08:53

General

  • Target

    8ff6dc0be8093a0a1b1621d1f405b0fbf4abdac7e0b71adc62273bf6f24a4948_NeikiAnalytics.exe

  • Size

    95KB

  • MD5

    9e8cfbac24f18d41145e311512d4a130

  • SHA1

    e15bc087e86be84116f7f552114cde0e0a29955e

  • SHA256

    8ff6dc0be8093a0a1b1621d1f405b0fbf4abdac7e0b71adc62273bf6f24a4948

  • SHA512

    e4c75e6e7d78c2436ab8ecafef9b139b7b0f9a170731ae7abf40f32405b32c2fe8f0a6f5b7acc77b7ecc04ba83904df777dcd0e64ecc3f42c70e75b49e64610e

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8zxm:fnyiQSor

Score
9/10

Malware Config

Signatures

  • Renames multiple (1020) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ff6dc0be8093a0a1b1621d1f405b0fbf4abdac7e0b71adc62273bf6f24a4948_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\8ff6dc0be8093a0a1b1621d1f405b0fbf4abdac7e0b71adc62273bf6f24a4948_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2268

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-39690363-730359138-1046745555-1000\desktop.ini.tmp

    Filesize

    96KB

    MD5

    669495902899f37c4cceb4a4f87a6945

    SHA1

    797df28540c1159bcb5c80b83ecba0533a649222

    SHA256

    86efae832c2f2ba6255c3dd5d0e3a4cdc7c7508668a64c7a517222d5dc5733df

    SHA512

    105d65cd162ca3c421fb33f8f66902fdb040ccbf5f2bbee629b1fcb3a970cd7fa907b77b99762e9930e383952b9bbfd4c439a689ca2c0e400179a30830ceb240

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    104KB

    MD5

    b9bf2f84ed6e51970a7b05e50e3cce67

    SHA1

    21211d0c48a92cf5e8e867c61c309538b9f83694

    SHA256

    2301af523e9818d1d48a8dbbd4e5b414c7407d73816f4fcfb31865be0880c778

    SHA512

    c592fedc029733fb98c46df67392a7a7e114a90c64b784066b146b0407743d627e2a257a68af8fde742f8fbbe2e79cd474c18dda400d71d4303c0ab7e2447c31

  • memory/2268-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2268-74-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB