Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 04:33

General

  • Target

    359fde4cdc2a92e579f8a22b78dd6fa31cae93110ae319f906ef5813004d9914_NeikiAnalytics.exe

  • Size

    63KB

  • MD5

    9196d88e111152442bc51e81cf0cb400

  • SHA1

    eb7a6b76399932d79dab1db5c1864c8b21c9392e

  • SHA256

    359fde4cdc2a92e579f8a22b78dd6fa31cae93110ae319f906ef5813004d9914

  • SHA512

    dfc8a017893fefed5b081dbbaad4a4f36e1343c8c617c46cee4b55f2ae56477431e68dda08ff467d86c6266e1d2079ba53f54d3fbd7b30aab0774134fd5a8f4c

  • SSDEEP

    1536:CTWn1++PJHJXA/OsIZfzc3/Q8asUsJOLKlD5:KQSohsUsUKlD5

Score
9/10

Malware Config

Signatures

  • Renames multiple (3521) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\359fde4cdc2a92e579f8a22b78dd6fa31cae93110ae319f906ef5813004d9914_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\359fde4cdc2a92e579f8a22b78dd6fa31cae93110ae319f906ef5813004d9914_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1280

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2737914667-933161113-3798636211-1000\desktop.ini.tmp
    Filesize

    64KB

    MD5

    8a680eec3846d2c226e16e959f406da6

    SHA1

    6651625bdc8ca03eae6f2a1324ad35a507daba3f

    SHA256

    806317a44e606fa7d753fccbdfb9d20f21ca98cc77869680b06e446ac468965b

    SHA512

    59aec65c638c927cde7ae1277aab75659c948645f32841a4ca793db679f0144c2725b559f44a2f5c1c715ef049a203112305697fb600efbf4c7a20fff76909ac

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    72KB

    MD5

    1d6efea50b09351b09ac4763e740cf25

    SHA1

    c9f7d7f20e71ab75bc031f064b35ec68e36d0fb0

    SHA256

    81d9cc5371b4173880d71a4e5f3e4dd85d9c37780371b6e59fa0347cc3be898a

    SHA512

    17b56234c26bd7db88a7139a79ae3ca1d13ad003f2ab9e3d3354c7242560faf9296b6a6541b7e2c287475c0950a51205f2a844d122395c4229c62255459ef9de

  • memory/1280-0-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/1280-74-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB