Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/05/2024, 20:26

General

  • Target

    ed9a601bd0b13f66c2e61c05b53ddba0_NeikiAnalytics.exe

  • Size

    142KB

  • MD5

    ed9a601bd0b13f66c2e61c05b53ddba0

  • SHA1

    3d75fff0d4891d1c0b8209299563f904ee6a880c

  • SHA256

    563cf8b4f74d8e3cf833ef86a537d6a86bbdf842082f48b1a0c0b3d663e3b82c

  • SHA512

    ea6c9c9c4ef715545479ee205d0724baf73a9c582298b22cca8e6edac5e0a662525bba5a69265ea7f3c2ced60a24beac6549a5dbeece7a91f7dd84f80952e746

  • SSDEEP

    1536:CTWn1++PJHJXA/OsIZfzc3/Q1pkMJ+ZGtK1+ZGtKQNMdTajOtGtU1wAIuZAIuJb:KQSo1EZGtKgZGtK/PgtU1wAIuZAIuh

Score
9/10

Malware Config

Signatures

  • Renames multiple (4838) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed9a601bd0b13f66c2e61c05b53ddba0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\ed9a601bd0b13f66c2e61c05b53ddba0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:4800

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1162180587-977231257-2194346871-1000\desktop.ini.tmp

    Filesize

    142KB

    MD5

    13d28ef3e379cf6f54525d6722532e58

    SHA1

    81cae662c69559db4aeb4928ade37d88595e769f

    SHA256

    1f1b7be3f7493dc1e748e19580f00473a4b7ef41a09d63f99c79a233a258c630

    SHA512

    607b453ceb7d5580bd5f05d1a81ba0f7d14e5f9b4acb2de0b12b7cf77f6bb3f989978f6a64a5d52bd3003e98b12d88c8037c6cd910d0aa0d8dd0690ac5cd720c

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    241KB

    MD5

    6266cc6d566bbcf7c9741f18fdddda5a

    SHA1

    bc42f7aa66213dda8df34a25616aadc89f9ce3ba

    SHA256

    57011793c1125c91c39653ecdbb60bbd00526016799ec347b173639b62e6f8e2

    SHA512

    0a3c83af8bcfe99ff28cfcb29edbe77d72b5144eba0cdfdcdc3495fe62675a9432b9a17748f4c3e999191196ecd57361477b7ee1451124badbdde0ef49c31b70

  • memory/4800-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/4800-934-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB