Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/05/2024, 02:16

General

  • Target

    5be69d21beb60d571e0523d99ea15790_NeikiAnalytics.exe

  • Size

    64KB

  • MD5

    5be69d21beb60d571e0523d99ea15790

  • SHA1

    4a0e9392a0d5fb78a512bacb922636da5b69089f

  • SHA256

    fa58374f77474521a3a1b1894b8c76004f5a0d6d4645af4702f5deb039394f3d

  • SHA512

    ae7f2164169b0e41547aceaf312a19c71ded10617d86509edb1d1fa397dd9c70ad8a1e99bf07d01d305edeedc40d090457c778f8173835dd23c3d3ff5018dd1c

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8ECf:+nyiQSoRCf

Score
9/10

Malware Config

Signatures

  • Renames multiple (5028) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5be69d21beb60d571e0523d99ea15790_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\5be69d21beb60d571e0523d99ea15790_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:4960

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4018855536-2201274732-320770143-1000\desktop.ini.tmp

    Filesize

    64KB

    MD5

    a895f78b278827c827526452567547a5

    SHA1

    032da3f089a21c19103aa3a0629765f574e2c08a

    SHA256

    3dc520d747c683b43bdf9fd4e719732a043c41c437b5ab99ddd9cd48a912450d

    SHA512

    d897fc9c2b8b1efea1e4ec5cbb44f1969a5c9194abfe5b7a643273816d0d540d28adc4c9751064bc8cde492bcff42764fa69929873f0be4b5db99796086d88e7

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    163KB

    MD5

    50df705967417a13c3f41850538b31f2

    SHA1

    9542b163ab0413945a48bf791268c48f98711e86

    SHA256

    e36fc33ab601235bb7514ca952b1547485881948f84eefdea765ee0e728d5410

    SHA512

    d8fa7ef138b97bc3e50442295fd3b5f7201f3c08093325593bd5483c98c46057c525a92ad1be9a7b93adf8f676b1ea1895f8d337cb2e6205457a31bb42592184

  • memory/4960-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/4960-1808-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB