Analysis

  • max time kernel
    150s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/05/2024, 05:52

General

  • Target

    8d0b0eebb75fa2339d5870bcafe3c660_NeikiAnalytics.exe

  • Size

    99KB

  • MD5

    8d0b0eebb75fa2339d5870bcafe3c660

  • SHA1

    77bebe68652de9f91f418a687b71e35f94ffdd5c

  • SHA256

    337844a68d5408e7f1068f991f4ec9f5089626ade37d96b76442bfa7198ba470

  • SHA512

    9da2514f49747a4e3bc80dc458b0b24eee8aa1adef53baf9280bf93c0ce463f9dd08b0e56174ce19f283473345d9b02369da6b071db16e7f5cf9cc544de4a073

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hf5S5:hfAIuZAIuYSMjoqtMHfhf5S5

Score
9/10

Malware Config

Signatures

  • Renames multiple (4863) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d0b0eebb75fa2339d5870bcafe3c660_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\8d0b0eebb75fa2339d5870bcafe3c660_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:900

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4018855536-2201274732-320770143-1000\desktop.ini.tmp

    Filesize

    99KB

    MD5

    dd6d47bb03fdd45e7df734eb6a117f6d

    SHA1

    b7d37474c85d130374768cea7427dc0c3836721f

    SHA256

    72eb2aafe573ba662e94aa9f5eca3c2423b9e86c09d7ca674584323d868bf6ed

    SHA512

    3c80a25733ad768a0001fef3c7ca93909282951988d598dbd8932b4d76919709676ea5cd6805436ff43ad8e1aa4aebc2ccb4809a915312c2bc26f6ad124fbe67

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    198KB

    MD5

    a30ea01d19cb2f04dfc44ba4e2fa4a33

    SHA1

    7ea1fbfd49c6797a5fd0a28e760b8fabf235c867

    SHA256

    0a2fb2941a7d313b324f5b28a3a23298c58c519375ae3abc4ee005777d5a1b04

    SHA512

    37f8a7519848a23dee24161525e703abbc0216cbc9a79ac779187012eafadebe3830bd44e59909b0bf11b4d75adb464f78e94085c3d31ceb4bd6b68f4b28e605

  • memory/900-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/900-1054-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB