Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 04:37

General

  • Target

    35e2555d5c740a6564f221ac935d6558419902894521c8fb394fad93100e0a08_NeikiAnalytics.exe

  • Size

    83KB

  • MD5

    e01dcae3e48fd0e70a8711ebb7d1db60

  • SHA1

    ed216ee13cc145ae3f57532a19752b75f58107ce

  • SHA256

    35e2555d5c740a6564f221ac935d6558419902894521c8fb394fad93100e0a08

  • SHA512

    21f4a5e0d4f9fd3b2dbec87556b38b179f3490a1d33412e8b4d2de7c13b48c12bb61c382c1633aed5aa379ab434b4925987d8ee3e87a57655288ebb84820489a

  • SSDEEP

    1536:a7ZyqaFAxTWH1++PJHJXA/OsIZfzc3/Q8zx1:enaypQSos

Score
9/10

Malware Config

Signatures

  • Renames multiple (3464) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\35e2555d5c740a6564f221ac935d6558419902894521c8fb394fad93100e0a08_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\35e2555d5c740a6564f221ac935d6558419902894521c8fb394fad93100e0a08_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2068

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2737914667-933161113-3798636211-1000\desktop.ini.tmp
    Filesize

    84KB

    MD5

    5fea2b1a18504313e917fa9f569b4d7f

    SHA1

    71f6536c958e49e2f9c0985c25a14bc9c3fa4c00

    SHA256

    71fef962f019404ce06dd5fd47b012e691ed12ec533ad513220ca2a1bdc12831

    SHA512

    fa449f2ed884d1c336107a6668a4611a75d41901f5469ae4be50829c9f8ed4801862e5effc9b518ce5dff3749fae56b645957af2602b59c0f9ddea53512e3d96

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    93KB

    MD5

    ca821975b2b95fc2039015dfb43a7e2f

    SHA1

    3e30f0e49503d4e1e35ff2428f1836e4009a247e

    SHA256

    a26f5858677e55806ae647b8357b267cd4617669b494edb4db2672f5f769f345

    SHA512

    61b0a8b5a2ed2d7f684dc622377833aa06e9f7d3530de3a101211d3279ea0f5c2bcd9c470fb1ae8886131f96d82786c473674e90b90e11c58e0db7e36c6c51d6

  • memory/2068-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/2068-652-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB