Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 04:07

General

  • Target

    3434d3fa846225eea95a03379fe38ee2790671158bd8b7f4aa1bd84b96647c23_NeikiAnalytics.exe

  • Size

    160KB

  • MD5

    fe861f5a84c7af4cccb23c28464f3610

  • SHA1

    5180379dce05072f939ed383f178b13dfdbe95b4

  • SHA256

    3434d3fa846225eea95a03379fe38ee2790671158bd8b7f4aa1bd84b96647c23

  • SHA512

    6e7fad39c239fd15f8c90c30d38799828e8a75d8916f24504595e0ed2253f0fd1abaedc6072f30c8842398493ae816d500ca69a7c7b01c22c27fa6c93ccbb5f5

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8OyZ2FdldtTWn1++PJHJXA/OsIZfzc3/i:fnyiQSonyZ2FdldJQSonyZ2Fdldb

Score
9/10

Malware Config

Signatures

  • Renames multiple (2851) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3434d3fa846225eea95a03379fe38ee2790671158bd8b7f4aa1bd84b96647c23_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\3434d3fa846225eea95a03379fe38ee2790671158bd8b7f4aa1bd84b96647c23_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2964

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2297530677-1229052932-2803917579-1000\desktop.ini.tmp
    Filesize

    160KB

    MD5

    00f6d6987504459d6162af599e3dc0fc

    SHA1

    97bcaa2c3f61e405e8de2c551a3b037879832f44

    SHA256

    724efaa46b5f2472dfd7775a85a1dac42f685857c029c3f90c9037c513c2faac

    SHA512

    b5fc567c9e67106d9b15cad9de0005f4f4ff397e00eaa7930e0c8bc55fee3e400d9cbfeafbd2f66745c01fdf439317cb6afeaed7261580130bf61f7b87d66851

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    169KB

    MD5

    2075dda030d911a89b40cf3e3997832e

    SHA1

    24c9a1f08810ef2db0140f7ac9585278a04fef25

    SHA256

    3d8880df9ee35f59cf6354831e927513de32e3493c8e5941566fb56dad5abdb4

    SHA512

    c147313c90cd79100bd1f65cd803527ee62d924282ae9efb796651848817bb7b3997aa95dda04cc79d12617575cfc6705fb91737ef1d425b701ebedf6a78b563

  • memory/2964-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/2964-184-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB