Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 21:33

General

  • Target

    0b2a0a14a35ec5a0cbaa44aa0c3aee2a6b0dfdc90aa802747fbcb248032d63c6_NeikiAnalytics.exe

  • Size

    89KB

  • MD5

    f93f02245aeb119a261a20b73e48c0c0

  • SHA1

    eb15ea5c45202ad9dfc97d7296358185ac379b0f

  • SHA256

    0b2a0a14a35ec5a0cbaa44aa0c3aee2a6b0dfdc90aa802747fbcb248032d63c6

  • SHA512

    7488d2ebe14b61e9a78bf137e7b585ceefe6ec59a43707c00f3991d943406acfd77567d9c091ca4199eff0a9418ae1548b1376c267188638ca98c5ee13050358

  • SSDEEP

    1536:a7ZyqaFAxTWH1++PJHJXA/OsIZfzc3/Q8VCnXxX81jmQJHdJHOUykUy4:enaypQSoPXxXokj

Score
9/10

Malware Config

Signatures

  • Renames multiple (3436) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b2a0a14a35ec5a0cbaa44aa0c3aee2a6b0dfdc90aa802747fbcb248032d63c6_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\0b2a0a14a35ec5a0cbaa44aa0c3aee2a6b0dfdc90aa802747fbcb248032d63c6_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2228

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3691908287-3775019229-3534252667-1000\desktop.ini.tmp

    Filesize

    89KB

    MD5

    1fc9278438e6b5db70dcba7e43c2a34e

    SHA1

    83f91f348d0ff482eb299dfe686bae7122d9431c

    SHA256

    96782bf3a828b032414f8074478f02315ab1d009541d73f9b5d475be302a0d9c

    SHA512

    5c5dae752430390e9fc77c2810882a56fb2284867aa251538b7722abe7f40bc9a7097b8398187b9782ae396e5e0836e9da6ff260cbea0f5f2a1c27e35453884e

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    98KB

    MD5

    5ea3e628c041767a7c678a30fd7e3dcb

    SHA1

    f1fce6888bf87d8eef22368e8efea7d9cdda7a20

    SHA256

    e3bc3956a307acaf79903e87ac9970f99cd08967d264c842e57798000db55906

    SHA512

    73bb6847adb542eed808f345408598995257442026b3b9d08ce18e28345212185aa51fbe0acb0d8f8d531dffa48eb6e4a86ca8e560870974b7c8a0de253f49ee

  • memory/2228-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2228-442-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB