Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 05:04

General

  • Target

    376e2e4197fb6fe8d32159439aa3a9244315d1267c864eb94e5c316fef1de338_NeikiAnalytics.exe

  • Size

    152KB

  • MD5

    b2426bdd2dbdf7f0ddb9636ccde15540

  • SHA1

    15dbce1e70b9088a68d9a079bf2925699b697809

  • SHA256

    376e2e4197fb6fe8d32159439aa3a9244315d1267c864eb94e5c316fef1de338

  • SHA512

    ed4d40e4d5b3fe7b642906bec4b1c57bd16c2dd1a1466fb5d0e344fbd5d3eb97c86ec00c1707b084c901e316d78c203444cbda0c806a2e02a3ed18a34c8101c1

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8OyZ2Fdld47HhuMLwkT+vd8:fnyiQSonyZ2Fdld44kT+F8

Score
9/10

Malware Config

Signatures

  • Renames multiple (3432) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\376e2e4197fb6fe8d32159439aa3a9244315d1267c864eb94e5c316fef1de338_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\376e2e4197fb6fe8d32159439aa3a9244315d1267c864eb94e5c316fef1de338_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1776

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2737914667-933161113-3798636211-1000\desktop.ini.tmp
    Filesize

    152KB

    MD5

    27c8e3dd91d23900857679507328db5c

    SHA1

    8abb2a1bf0d1e2accb37a7693048b2b2f0863470

    SHA256

    e080d983ac3864910404b311b8bbc1c65c7e8c8fa901181dc2300a0703c66264

    SHA512

    4bf27f1a5de89441128c76e05bb225745fe4135336dd3b4df5e007853a27e3f3ddccb342e85e0927c456147447344c4a29e44fb097c5aaef2351739141b849f2

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    161KB

    MD5

    f25e42afc7c6c2dad5626164c93f52a5

    SHA1

    9b8e6661de4b011a7cbbcc08fe1fa1fc324ffcba

    SHA256

    4467c8ba384136ab543f3ef4db12e3c856eb18889e82df9586aa9b6325661c35

    SHA512

    bc492a742bf4a28ce91c9f7447845d1b5c317886b505c31eecc6266f7491af987a45f49c73a4f2f95c22b1f43374b670b3de61ffc0fea8a5b590b52cd17396fc

  • memory/1776-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/1776-642-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB