Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 03:53

General

  • Target

    33684bf4eb22f746a438350fb5537d265775c20db942286f0f9a88b8fcaeb627_NeikiAnalytics.exe

  • Size

    100KB

  • MD5

    411e0123eca157aced8555a6b9965d70

  • SHA1

    2c0591329eae77a4e2b653ded99be7bcb7a67146

  • SHA256

    33684bf4eb22f746a438350fb5537d265775c20db942286f0f9a88b8fcaeb627

  • SHA512

    9ae588884fc82e4ed1463536b88f7689eb26713dca7d281cce861680a6650ad0152e30132169336f38671edc06b6bd62aea753069e06453b747c02f432dcf7c0

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8asUsJOVYd7n97ndJA/fqJA/fVyayI:fnyiQSohsUsKY5ZhpI

Score
9/10

Malware Config

Signatures

  • Renames multiple (3420) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\33684bf4eb22f746a438350fb5537d265775c20db942286f0f9a88b8fcaeb627_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\33684bf4eb22f746a438350fb5537d265775c20db942286f0f9a88b8fcaeb627_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2940

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2297530677-1229052932-2803917579-1000\desktop.ini.tmp
    Filesize

    100KB

    MD5

    8c54f170d706cbe91974e3cfc2d7f70e

    SHA1

    8e91cd1fa3961394c9463a01626584d0f13f5ebe

    SHA256

    71bc2b315660bb75b4917d3ea6849d7257f0814622ba23b5925c77ae09336f25

    SHA512

    9ce306181117027ae5404f61e254513a3165ca8fb9992453cd6704dda14179665b7c7712eb83f1ccb27227e414a461722591bffa5524e16b3d13207afdf32397

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    109KB

    MD5

    f469e8bb267f11f08a1fd2e0d7eb5357

    SHA1

    2566d0da6f192076b95b603f25a7771a78ae191e

    SHA256

    5922ff70ea8b8e8734786e9a6583c17c0acb1761ab861c175a67b3007cbe1d82

    SHA512

    85214df563b2366c4660292a25fb834252aafe3f6aaad1da35c324d82102052d9d3c8f8e210646cb9f3befb36d17ca97d8f75da7200eec3b60cf855e6965b9dc

  • memory/2940-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/2940-392-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB