Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 04:31

General

  • Target

    35890089b47939e368a2949ba61e8c35dc21c2fd580718d92c6506d9706d0cca_NeikiAnalytics.exe

  • Size

    90KB

  • MD5

    68e913b13d50f12fd938b8cf579985e0

  • SHA1

    d6f12dc2916530aa9221ebed7ce07995f5b3e013

  • SHA256

    35890089b47939e368a2949ba61e8c35dc21c2fd580718d92c6506d9706d0cca

  • SHA512

    b454f1cf5bfe6a610f7209af21f35ea0ce8ba4a3497bedb0781b7bfce57d545d9253befddd4203e157a6c73b8c07b5a795794715cd8e514312f6d7eee77a6470

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8asUsJOVYd7n97nF:fnyiQSohsUsKY5ZF

Score
9/10

Malware Config

Signatures

  • Renames multiple (3454) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\35890089b47939e368a2949ba61e8c35dc21c2fd580718d92c6506d9706d0cca_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\35890089b47939e368a2949ba61e8c35dc21c2fd580718d92c6506d9706d0cca_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2008

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2737914667-933161113-3798636211-1000\desktop.ini.tmp
    Filesize

    90KB

    MD5

    cc7adcee472c7888417ab417dc382dc6

    SHA1

    ecc6d95c174265a3ff3c48d4c1d01feaf31264ed

    SHA256

    ec55d45669af00d75062bb7027edc49aeb1240ea344ba61c41f265c2e5385fdf

    SHA512

    f847c008c4d8597813b143501c7352c0b36f89652e12fadba967fe09cd84937db9708e5b92b852e6c9e4f6ce9e1461e26603e3789ad66a2ec8ff04cf4e46c4d8

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    99KB

    MD5

    85271292fcbfcc365d916f8910f69558

    SHA1

    0a2361815f9a5a4504d252238a45be716e01546e

    SHA256

    a5611ec2ea1a6198cc35bc7d110a75d1f9729b7e25ddb8c8150c6c911c7cd501

    SHA512

    f1b27ee71ff343c10c9a6b95ba15fb2826784d3576ef06f8938e359484cef3407b5ca7ed3ce1d31b8073dacb042751444995dc6dc9871f355e2f9fb5b10c0d88

  • memory/2008-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/2008-644-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB