Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 03:38

General

  • Target

    32ad453eaab8cfef62706b4beb50996a71a5bd68f955942227b3641f301244a6_NeikiAnalytics.exe

  • Size

    78KB

  • MD5

    b19f3b009df3e585d1394bca80939870

  • SHA1

    1ed13e88951f6575c63e80675f55b55da5e3bcc7

  • SHA256

    32ad453eaab8cfef62706b4beb50996a71a5bd68f955942227b3641f301244a6

  • SHA512

    96f39f6cbf7fbf6c7a189dcfd7f268954bb45a41d2cf238283e685e1f531e847f73e12c38ee3e101874a947a13c2923c2ec204d4cb27a9eb5949a378045b1572

  • SSDEEP

    1536:a7ZyqaFAxTWH1++PJHJXA/OsIZfzc3/Q8jsfEiDt3:enaypQSoTEix

Score
9/10

Malware Config

Signatures

  • Renames multiple (3112) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\32ad453eaab8cfef62706b4beb50996a71a5bd68f955942227b3641f301244a6_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\32ad453eaab8cfef62706b4beb50996a71a5bd68f955942227b3641f301244a6_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2108

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1340930862-1405011213-2821322012-1000\desktop.ini.tmp
    Filesize

    79KB

    MD5

    f9ea20636eb207abbee2848c03080b4a

    SHA1

    4f3dade7e5b47944fd2f18eee867daaa9f5a32b5

    SHA256

    091446c03e35b7998b32e575996bad5d945c441f64473ce81353ca797161f402

    SHA512

    9206c784b74e6873cbeb03826ed260ade8acf78df01a66d5c33f5e305c540e2f7d76b002a74f89a6ba01c7bf3e204b905a7c56c29fc9dafad475a1a6e2beaf26

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    87KB

    MD5

    87dc4f252329e101fa94307747f16e35

    SHA1

    8ad4c8a2cf389b1d82efc5d626fd4792ab79201e

    SHA256

    f106620de3b337909e49d161e06acb22fa5664403e5ae5badffb436da1f441d2

    SHA512

    7fc74b13a4568f9de15a2b2c32d1883b733e810d70baad2fb7e7112b6a4d556f5048e251ba86a37ee6f80a9ac809d967c8dacde473f54d2aa21d5d2673a29066

  • memory/2108-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/2108-162-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB