Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/05/2024, 18:33

General

  • Target

    c1f2019cdc09a7567f99e20c7d791690_NeikiAnalytics.exe

  • Size

    309KB

  • MD5

    c1f2019cdc09a7567f99e20c7d791690

  • SHA1

    7084179ac84be5c5f9e89b06ca27381cffd1961f

  • SHA256

    33308c1dd8297b503d9b44a32c4ad81352ac2c069e6751c3c0974c3906ae20b0

  • SHA512

    03607e40e84594505acc688a623111efb40e743127a30199b98475046f64fd8a2f3c857bf4ef7e816a4e65d689ff6c952d288d9462a2eb0f55327e2ead2f9e3f

  • SSDEEP

    6144:JiQSo1EZGtKgZGtK/CAIuZAIuuQSo1EZGtKgZGtK/CAIuZAIuZ:AQtyZGtKgZGtK/CAIuZAIuuQtyZGtKgI

Score
9/10

Malware Config

Signatures

  • Renames multiple (4227) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c1f2019cdc09a7567f99e20c7d791690_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\c1f2019cdc09a7567f99e20c7d791690_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:4448

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3906287020-2915474608-1755617787-1000\desktop.ini.tmp

          Filesize

          310KB

          MD5

          38407535f7f6d750ecb5d5dd577c1121

          SHA1

          e9da8bf7ff0b3ea29fcd9599ef59ca2bb3d9ec43

          SHA256

          0507ff38ed5fed5c58c20e69491e78ba2a3fae2fcb6961a1ef20664e2179d0e3

          SHA512

          dfb1bd5be31240b665e9c40e41210478da3afa5b10c96302f8268cbbc530eff1adc99f10db593292da1801acd2b43b877fd3f88f4d273a7139b28cbc5ca3a325

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          408KB

          MD5

          0a57808a124dfa39a938c80f37fe0115

          SHA1

          c0cfe4e51354f1f93e5fb2e5f964ac634583717b

          SHA256

          cb0ef0b511e01f886db3a4a9838f15ab0e847c9b28a010495c737e2b29d071f0

          SHA512

          4c4f418f31da13cb49469b7685f8debf82ea1f244de313756d6faa1b7a68ed81a106315f0d5a3ec88279d8d1975a95352129ac76ad91ea57acbd02fab57d9033

        • memory/4448-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/4448-1418-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB