Analysis

  • max time kernel
    150s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-05-2024 10:05

General

  • Target

    8ab12f9e480c0bf0a0f7a455dfe3a87a_NeikiAnalytics.exe

  • Size

    135KB

  • MD5

    8ab12f9e480c0bf0a0f7a455dfe3a87a

  • SHA1

    ddc8f60bdd796ffd14d123986c0ed4fd3a652994

  • SHA256

    e5c712a74476ce2b9be37a8dde5f2ebed8e9c96dab4c2c65f799f96134812094

  • SHA512

    a6cf271958cfed149f44ca24d13d389222c32b0e574f65a22ef7938d3f73e067e02fd91c0fafb575ba5ab4242980d5f78da3fcb304df30c962ddeb1214db1fa7

  • SSDEEP

    1536:67Zf/FAlsM1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCd:+nymCAIuZAIuYSMjoqtMHfhfg

Score
9/10

Malware Config

Signatures

  • Renames multiple (4854) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ab12f9e480c0bf0a0f7a455dfe3a87a_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\8ab12f9e480c0bf0a0f7a455dfe3a87a_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:3968

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4018855536-2201274732-320770143-1000\desktop.ini.tmp

    Filesize

    136KB

    MD5

    5c041b04a6c74269b2a9d7391f0e8346

    SHA1

    5fb96277690763900e2796979e80274e39af5151

    SHA256

    a1421e3581f226d87a420b6457571eab9d0176a532c77a35a0779b7a80e8d88d

    SHA512

    7a8cab78c51543f2af2ce741d1cda5e567380569e30a7d988e207e964e0e596b096b70f9e80f1e0432add00462007168c18026c8e27cb8bb75e0675efb4d1f0a

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    234KB

    MD5

    620b2d66191ab71edd84614d9d44424b

    SHA1

    cbe40cf8bd3179099a58ffa6258377d4f4437d9a

    SHA256

    5fb28c9c97f2765c1f9253f5e2b8c4a56df78b3fdbcc47e741c67cb513154c05

    SHA512

    8155a0072bc2a9084e9460b324adc1af08cbe7eeca41cc864705f84c6a47c55b8411d680736cc5c2bf66d2738336ad0c353fe13891e446977fef6ea10956d9b3

  • memory/3968-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3968-1790-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB