Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 03:56

General

  • Target

    338089b0e7c28295c8aa7ac087a503d6b48f1495f347ccecae2ab310114649aa_NeikiAnalytics.exe

  • Size

    57KB

  • MD5

    ae00281992f86e7c3f0e5badbabe4420

  • SHA1

    07c479f839c913507cd5ebb31a146bd52c0b8973

  • SHA256

    338089b0e7c28295c8aa7ac087a503d6b48f1495f347ccecae2ab310114649aa

  • SHA512

    65f3f2292907810d82d6e40d3851e8e26c9a9f211e6cf1e222ad52d7482f4fea664eb9fff841b9a6cf5af61f9607885346e28a0c9ea73130200c566b61ff2d58

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFzG:CTWn1++PJHJXA/OsIZfzc3/Q8zxg

Score
9/10

Malware Config

Signatures

  • Renames multiple (3166) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\338089b0e7c28295c8aa7ac087a503d6b48f1495f347ccecae2ab310114649aa_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\338089b0e7c28295c8aa7ac087a503d6b48f1495f347ccecae2ab310114649aa_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1936

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1340930862-1405011213-2821322012-1000\desktop.ini.tmp
    Filesize

    58KB

    MD5

    bdf55d0518d69167d0beac0e698e370a

    SHA1

    dd3600b9f93b57aacff69b1748ba065381b6ad31

    SHA256

    12aceb2dcdd624e829e1b49092a60e799b88ff2bc025996ae71c17fc3016fffe

    SHA512

    280a1d6c2a729c09b7520cfe3354ad10e5709cff3e8a7b07e41df69eff4cbf98ab57896e536e02d7af68ce490a34e0082e02bfc2cc2f51f7cb1b9e3565d30ac1

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    66KB

    MD5

    51608946ae89d250cdd66ec0aae133ff

    SHA1

    aed674f16fffabc0594ceb8112e07953a95a73fd

    SHA256

    e335e8a7d8e07d611583a03ed172a0becf1bb76a7a663c953dd50950662f755a

    SHA512

    4b1bdef6f68343666e0ac206646a08f57ca89355e87244208a4c6e140c8fb85e2bca3e76a34cfc9ae1b6298a3f4988a4ab52507dfd6e1728e96e2a3926a7d762

  • memory/1936-0-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/1936-68-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB