Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/05/2024, 05:04

General

  • Target

    8402c2ac275c6736d632e0a8d7aac900_NeikiAnalytics.exe

  • Size

    161KB

  • MD5

    8402c2ac275c6736d632e0a8d7aac900

  • SHA1

    90fc37b8b7f21f86a5d354d37e6f62990f825d26

  • SHA256

    6e2ff427f999e9657fd94a0b49e5ffe0db258409f9de9e91ce9984c54902ec53

  • SHA512

    d5e35f0b4e9a87d9aa357260b776dc6a5b69036bf98d783051787022fbc42d84ccacc18352aa17a0c56f7d96a1ad94e6bba058c42264a224bdb53555b5d16b96

  • SSDEEP

    1536:CTWn1++PJHJXA/OsIZfzc3/Q1pkMJ+ZGtK1+ZGtKQNMdTajOtGtU1wAIuZAIuJBH:KQSo1EZGtKgZGtK/PgtU1wAIuZAIu3

Score
9/10

Malware Config

Signatures

  • Renames multiple (4752) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8402c2ac275c6736d632e0a8d7aac900_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\8402c2ac275c6736d632e0a8d7aac900_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2472

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-711569230-3659488422-571408806-1000\desktop.ini.tmp

    Filesize

    162KB

    MD5

    f3931724e2d77f46f5ce0f1e58b20111

    SHA1

    cb7f0acd9516420600ad5893a96cebf926ec0f91

    SHA256

    7f9578345a2b9f4180b9f216671f3d67b9c36e6da3e0c19bdee39e47c8623e41

    SHA512

    20f4a40d7245a5e32cd54683065fb4c1b427e1a99c5e4637ebe56e8a87aab2e43b1c98b6a30fb80a6f0fd81656f58416300de783c7b28e1b99915ffd9f31a025

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    260KB

    MD5

    247b20858eb69a5ef0c19e74f9bfc707

    SHA1

    335700bf272e86243a3d6355d16d0db28bff610f

    SHA256

    d1d2d9566bea30dee33768698206d19b2616917f00307965b3eb7f637a93b34e

    SHA512

    97093689b23ea00da6e1d6633a547447ff421a2a0a1453e50aef30ec94850996c6d83ee59fbce800d873f15d800955bd1a2abf52aa115a4193c04c1249fa1946

  • memory/2472-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2472-866-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB