Analysis

  • max time kernel
    75s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 03:44

General

  • Target

    330ce0d8644b658359ecdb0b8b37a96e760961eb46de3c4be6a4940cbcbecfec_NeikiAnalytics.exe

  • Size

    66KB

  • MD5

    780febe393568689c05883434fe68ae0

  • SHA1

    a5202db88343d8f2bf1f99cf0a01788851e8a248

  • SHA256

    330ce0d8644b658359ecdb0b8b37a96e760961eb46de3c4be6a4940cbcbecfec

  • SHA512

    d35bee157ab4a75822f38e5b09dd5d8c476ff431649fb1fdb00a494f4635577827b3ed1844372ca54521ec435537cd83fbcdb3687704f9b3a023a30d46fcd975

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFzy:CTWn1++PJHJXA/OsIZfzc3/Q8zxSLpM6

Score
9/10

Malware Config

Signatures

  • Renames multiple (933) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\330ce0d8644b658359ecdb0b8b37a96e760961eb46de3c4be6a4940cbcbecfec_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\330ce0d8644b658359ecdb0b8b37a96e760961eb46de3c4be6a4940cbcbecfec_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1848

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-268080393-3149932598-1824759070-1000\desktop.ini.tmp
    Filesize

    66KB

    MD5

    69b969492c1b276bb1938db018dc766a

    SHA1

    3bbb3af351a56e16fd80a090ec395e0dad5edc45

    SHA256

    5ee88d60288935406577ed9f534d810f6ba6907aa1f2b70b11fb977392609379

    SHA512

    9edc22f048cf2243169e8e9482b2fdbccdc64b97ace7c88a40df8b5b08852b285032572b4bae8787620f8687793b00bc1d70a5ed1ecf4e0b5b4a261e51d9ef9f

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    75KB

    MD5

    4a0b4686114843979525aa34d024d69c

    SHA1

    bf438c07570bedac35dcf74606abe9fe05bde1da

    SHA256

    626fe3a872f044a77046ce18ee8e32b9f317eb4cbb620de68d49a2ec5f919914

    SHA512

    6ebceb9cce3a552481b366523b04e674a694ef67c781e629f22fec78f222c4d95a4b2df4a18ecfc261713c235aab2f1ca1857097beaa091423374eed6eca52c0

  • memory/1848-0-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/1848-70-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB