Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    29/06/2024, 15:20

General

  • Target

    b0f3b62ffd02089d92e17a69d754b0fd63ddf49320071f10f24839a25467e25f_NeikiAnalytics.exe

  • Size

    66KB

  • MD5

    cffb29d27b0ddedb115434b113d59620

  • SHA1

    c29fa058192f0625fd6626bc59d6ae11ddb01ee1

  • SHA256

    b0f3b62ffd02089d92e17a69d754b0fd63ddf49320071f10f24839a25467e25f

  • SHA512

    e20f172fb19c17f61df67c378a09dafacc2f705ddf1ffb47006bd9f9f00dc47435f5750269c6fbd0915aa9a2b8086baa317b9a6dfaa4ce1e9fdc0b042712ecce

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8RKLKD:fnyiQSoOKLKD

Score
9/10

Malware Config

Signatures

  • Renames multiple (3633) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b0f3b62ffd02089d92e17a69d754b0fd63ddf49320071f10f24839a25467e25f_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\b0f3b62ffd02089d92e17a69d754b0fd63ddf49320071f10f24839a25467e25f_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1300

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-268080393-3149932598-1824759070-1000\desktop.ini.tmp

    Filesize

    66KB

    MD5

    f968638f691cda2277ee7cd8d6fe46e8

    SHA1

    8d38d5db9d782f73b72f733df008c56f4aac4750

    SHA256

    fa8411702560f979326550131a17434c92bc1b29be21f7815b146641e37bf423

    SHA512

    bb4923f326c74395fc35c04bd406adb0fa7040990846d70f0dffc069345cd16a2c94256fba7388cd48ab9f224ca3faee1a19105d95b390d8b6a74551bd2e3d75

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    75KB

    MD5

    2b45a9c86d538816dbca5512b700d3c1

    SHA1

    a51e84f268cf8c9d3ca59ac1a32e71a1cb0d522e

    SHA256

    19a12f8f4c8c81e35f6d2a412534d8da4767c590d6158ac4364981c29df5e63a

    SHA512

    fb2d76c8ac4925647ba482ec51de7fb2b04389ccaddcd4296dccfd55d9d583411e3535ac1e10672b7b71e1c711cd6139b74bc055bfa2d267c9255d4bbe60f499

  • memory/1300-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1300-650-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB