Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/05/2024, 06:33

General

  • Target

    93dc5f73d006528814568b1c67ec5db0_NeikiAnalytics.exe

  • Size

    100KB

  • MD5

    93dc5f73d006528814568b1c67ec5db0

  • SHA1

    13714c921e66a15fa58868bfaa31e528290dbfba

  • SHA256

    66a4245a7d86a810b14f7acdc99b5a5cbac77ed795ee82d74ea076d59311081d

  • SHA512

    6cd6e8b6e140823787175b2f6c2a76bc9d06547fa754dbf61ad164a0e92d6894cb9d7fe820a4b17d3b16fb52bf4490c648473af60dfd5b75de786f5238e9f26c

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hf5Sg:hfAIuZAIuYSMjoqtMHfhf5Sg

Score
9/10

Malware Config

Signatures

  • Renames multiple (5023) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\93dc5f73d006528814568b1c67ec5db0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\93dc5f73d006528814568b1c67ec5db0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:3492

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-540404634-651139247-2967210625-1000\desktop.ini.tmp

    Filesize

    100KB

    MD5

    873926c298f2dce94a14034da387ba51

    SHA1

    b9fffb15d7b03933d640a61a9f0a29f650b9d2b2

    SHA256

    68e34eb8c982b756949bfb0a38fa3e41df452dd93277b20fd4b395f9fb890de9

    SHA512

    39c6265c328438d805e8c299277151684d43fe13f2561e482cb01bd2a0c26f0a5c3ab2d1ef19cdb84e08f39b0d92255cd83fbf323e406eef2088366754232ca9

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    199KB

    MD5

    d50652d9f0b255614f9e7e123c0064f6

    SHA1

    277a8c7f6cc5efeaecf0b81dbe997b61a64e8355

    SHA256

    6ce4b2e01a34f8a93be0c4eccfa17b9b737f604cfafad602d9237153e28414ec

    SHA512

    0a06f3f41b6b6c19adbca6cbbcc81d0f838ea89ea66546e8996311fa9cabd0f437f573c537173ed193570b316c24173a8ab1c27f168489c738c0ebbf916dd01a

  • memory/3492-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/3492-1064-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB