Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    01/07/2024, 10:02

General

  • Target

    4925bf63ff4e54db9365e3a8c3aa140b93ed89357b9d4a820668c3b32599742b_NeikiAnalytics.exe

  • Size

    66KB

  • MD5

    f3be0ce92dd8636fba8cbe372d4e8b40

  • SHA1

    5f0c1958a22da13c8b7858061ceaae257bb964e4

  • SHA256

    4925bf63ff4e54db9365e3a8c3aa140b93ed89357b9d4a820668c3b32599742b

  • SHA512

    1db897c6e37a830154d28a8dc54811616b37494f414a1034bff1ab2d24d84d83fc2f72a38cb58e0a134e2921b9e05fb009fd132738c2800088bb57fe28a27689

  • SSDEEP

    768:V7Blpf/FAK65euBT37CPKKQSjyJJ1EXBwzEXBwABT37CPKKdJJxdPO9Ot6K/K2Ch:V7Zf/FAxTWoJJ0TW7JJQOEK/Kt

Score
9/10

Malware Config

Signatures

  • Renames multiple (3516) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4925bf63ff4e54db9365e3a8c3aa140b93ed89357b9d4a820668c3b32599742b_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\4925bf63ff4e54db9365e3a8c3aa140b93ed89357b9d4a820668c3b32599742b_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2284

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-481678230-3773327859-3495911762-1000\desktop.ini.tmp

          Filesize

          66KB

          MD5

          f8ea92f6558174269a2a50575a1e767a

          SHA1

          5a1097ec9165814c70a092f1f70b21ad1941ec54

          SHA256

          445c2e713726b2e7dbca615aa675d1398d694475c1b376973277df9c7bae9e92

          SHA512

          5b19261bad2524550c4677ea4d31f8257d6cac396df00d0f73c9d36488506435578bb1b402e12b88107e3942a26511072a9356973b3f4900e3db265e09b7088a

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          75KB

          MD5

          e7e65d77fc05a39c2c359b51482c5319

          SHA1

          1ef2f6c1fe3e8555e7fab89f3422bdcf84b4a3a9

          SHA256

          ccbdb247b201e4d175e166c4c99526be06abf8044f377b1c3519f48a3c3eea70

          SHA512

          e550e25e0b390ffa55857b1a7cc2de26a3a4ccc171c98141e4c7bb518a52be16efc447557fab1bb91eb56df6c3b5827dd0ddadf9033c9054b8ec3853962a5909

        • memory/2284-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/2284-506-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB