Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 04:40

General

  • Target

    3609fdd6521e3073a44a69df70bcc73f6b4057ff7ba5ff7cc312346e0aa31408_NeikiAnalytics.exe

  • Size

    57KB

  • MD5

    4ded6f14c1049b868dac99e85a3b3180

  • SHA1

    96e2ac023301ef5fc2235515a7d8648cb2e9ad1c

  • SHA256

    3609fdd6521e3073a44a69df70bcc73f6b4057ff7ba5ff7cc312346e0aa31408

  • SHA512

    7cb21fa00d1985708dde5c1540e8c23948af8984351b0f512e469550e1285c87500ee2dacf9d6a003c74d179a2d38e14baafee8d197a3546bffcc830a6672740

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFUT:CTWn1++PJHJXA/OsIZfzc3/Q8U0G

Score
9/10

Malware Config

Signatures

  • Renames multiple (3684) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3609fdd6521e3073a44a69df70bcc73f6b4057ff7ba5ff7cc312346e0aa31408_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\3609fdd6521e3073a44a69df70bcc73f6b4057ff7ba5ff7cc312346e0aa31408_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:3052

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2812790648-3157963462-487717889-1000\desktop.ini.tmp
    Filesize

    57KB

    MD5

    9b21435ba363cddaf83091d4ac9df34e

    SHA1

    69a08ae685c137fd5b141c690e2a720120c32e10

    SHA256

    2c6e55e892c9ad145a768bfa037e9d7048aa27d0d91d9fd455e5493a021ee695

    SHA512

    a0b5f7a0a09d1a9977a3f280aa32b756a36a0ae1dd8d19dec09a1bbb6a3307b571e66498514db6e64b0108281eb0e194a0ec62040483f188c952502504702cd6

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    66KB

    MD5

    dcc06e0192bf1d5c4dcc8098bc3ab6e4

    SHA1

    b0a57764ccaa13075e1ffb21f6bf0e200c9515a7

    SHA256

    9ec058e698589cecec674db02564e51bdd48711780080a600356889ab4f24d75

    SHA512

    4313875aecfe2e3f540ce07ebda97f886462000b6eb0c31f8788ea818c4082c8d9b3fd01db1d59e3ee565c3114454c1eeeab1ea78a22e2d1bda81c238bc0864d

  • memory/3052-0-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/3052-76-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB