Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 04:34

General

  • Target

    35a28496c41b8cc599f5e1f1784a3415d1125a295e4ba37f28ab39e60b8d69a9_NeikiAnalytics.exe

  • Size

    54KB

  • MD5

    65512d72ed3012bd8d9470bb61c113b0

  • SHA1

    628966932d3ecf3b6eebb7244821cabfa957f0d0

  • SHA256

    35a28496c41b8cc599f5e1f1784a3415d1125a295e4ba37f28ab39e60b8d69a9

  • SHA512

    1a913f669f5a7cdfcd126938d5b781a468ccb5b46b8d9bcdbc566a6ac0225f8fa8caf8b0b25f8a5c7e648377da638165e3fae6839ac3b6f2d0b624de2b08d13b

  • SSDEEP

    1536:CTWn1++PJHJXA/OsIZfzc3/Q8zx1ev1wcw6RHR9:KQSo/1wcw6RHR9

Score
9/10

Malware Config

Signatures

  • Renames multiple (3683) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\35a28496c41b8cc599f5e1f1784a3415d1125a295e4ba37f28ab39e60b8d69a9_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\35a28496c41b8cc599f5e1f1784a3415d1125a295e4ba37f28ab39e60b8d69a9_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1960

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3627615824-4061627003-3019543961-1000\desktop.ini.tmp
    Filesize

    54KB

    MD5

    5e6a7fd029fe8a32ba301e8c1134ff2f

    SHA1

    8f23d2abc34fd64f6c7117c37ce0a50478d0870b

    SHA256

    6d872004f28abefddd104b6b53344da18f2e9d75aaacba240bec7117216c47c9

    SHA512

    3b5ba88add94ac64a0dc7a6163323a740598c2fcc894d904c63728088acbefc5f6e0a8b9794a7baea19e79108508c09b644eb565407cb26b0c611d6c43991b61

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    63KB

    MD5

    b82088eee34003fc0ee734a05ebc3954

    SHA1

    6e55c04b86bc935e85cc90c825583cbf87e72cbf

    SHA256

    c5f71c13e26d64353ffff6fc7e8621342d07f27b9e2d33826803ad128dc813d5

    SHA512

    d688577aa05d48ea288183d4cb8e2e3c9ecefad2dfea93ccc810ef6a53d7539b9f39b7e2894528a136c50bbe48047fc7e5ca7e86328665b45530290ea2ae9e06

  • memory/1960-0-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/1960-76-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB