Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 03:04

General

  • Target

    30c1ce2719e46b38fdecf4e49a7db9a856fa4f2fbb0ac642a341934bbda8d8d1_NeikiAnalytics.exe

  • Size

    55KB

  • MD5

    4df61814463a39c6b4ed244f539dba00

  • SHA1

    0282c59c0fac193927030c30ef3af2e88783d12b

  • SHA256

    30c1ce2719e46b38fdecf4e49a7db9a856fa4f2fbb0ac642a341934bbda8d8d1

  • SHA512

    dc93519ea14e05b9eccd2b21eeed0bb6eac194f24f645aad13a16a3444040d4658e24f96802e84a711c95693da0b12780bb108814e6c7753f1470e2d15487ac4

  • SSDEEP

    1536:CTWn1++PJHJXA/OsIZfzc3/Q8zx1ev1wcwK:KQSo/1wcwK

Score
9/10

Malware Config

Signatures

  • Renames multiple (3206) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\30c1ce2719e46b38fdecf4e49a7db9a856fa4f2fbb0ac642a341934bbda8d8d1_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\30c1ce2719e46b38fdecf4e49a7db9a856fa4f2fbb0ac642a341934bbda8d8d1_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1736

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3691908287-3775019229-3534252667-1000\desktop.ini.tmp
    Filesize

    56KB

    MD5

    91ce6e3a8e7eabbb7b57d37ae85a7faa

    SHA1

    c52dcad2d486401bb26ef8c23b7591720c78aea7

    SHA256

    d5f77bb18e64c9eef3242efe119279cf67d49af76ba2a3268583fb65523a9954

    SHA512

    ff123e814e8cebe0b7f673cc75c3cf80d58cb89773634b1c9f9c57ffe12d56da214762af80a11560a3afa7a793d9aa42487a3f519d49b53741420269b5c4e160

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    64KB

    MD5

    e4a08df3d82737bb194ec4e7fcca2cbc

    SHA1

    56aa4b52aa2a04990cf91b1945eaf068b5f513bd

    SHA256

    f5f70c44c6d08a230c4a38da691a65d2509e1e86befd75b95f96013522577c11

    SHA512

    b27cb33fecc783bb6a5028c91a746d4a56bf16e72f8524bfb5042e6d775838a6f36265bd4d3cb28d41b10da6a570208f6a0c574898c8ec5f296749e4d3c44769

  • memory/1736-0-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/1736-68-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB