Analysis

  • max time kernel
    150s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-05-2024 11:14

General

  • Target

    cefc238441f49df074f5537e2142c990_NeikiAnalytics.exe

  • Size

    233KB

  • MD5

    cefc238441f49df074f5537e2142c990

  • SHA1

    e4a1c02e93a9cb6acd7757fc9187a8df3493c365

  • SHA256

    acfc1c38a3cd8aeff86bcc456dfbccc1cb151324a7b21d0ec4b57c2a6c360d52

  • SHA512

    51e22528555e47f36527fcd8a122b0fc85ebd32040bf178a9e5b162e7bda2ca458d739f7409c2416c94b2ebbba0b9f78d24ed6464dd1fdd3f82c905981d969ad

  • SSDEEP

    3072:+nymCAIuZAIuYSMjoqtMHfhf90NQn0NQvfAIuZAIuYSMjoqtMHfhf90NQn0NQZ:JmCAIuZAIuDMVtM/7fAIuZAIuDMVtM/l

Score
9/10

Malware Config

Signatures

  • Renames multiple (4656) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cefc238441f49df074f5537e2142c990_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\cefc238441f49df074f5537e2142c990_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:356

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-711569230-3659488422-571408806-1000\desktop.ini.tmp

    Filesize

    233KB

    MD5

    58d4ba69079d77bc1ae5917cba8c7571

    SHA1

    e625a6ef0fab3d69fc41fbda46905883041f8553

    SHA256

    d761703421c34776ac1579b0860081bed4826041391f1ad74fbc105ca209fcfb

    SHA512

    863b30647b7b6e90e1baeb10a6d232ce5662bf1cb1e0b9d332b2ee1a07f950cb722f0971f21e7c173328f9a694433102de65a5a05989a71e75f4960c17935b0d

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    332KB

    MD5

    f687560767b6936de2fc83967aad5a45

    SHA1

    b80d0774b64dfe5e5e25250957a6313f56d38c1c

    SHA256

    530b79d8ee78d25cddd57801d77ea242622e670736b1d79c56ae1c445d371418

    SHA512

    088e9c4554b26e74e4d5f6f4414b0c680d044fbec4516a657d09c6eb55778ece3b4d2e9c030040555adddfbc21cb757d035132b9362969e624412f6e0e30a711

  • memory/356-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/356-1596-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB