Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/05/2024, 23:00

General

  • Target

    30432fd62f6c90d8242f79fe06914530_NeikiAnalytics.exe

  • Size

    134KB

  • MD5

    30432fd62f6c90d8242f79fe06914530

  • SHA1

    89af17e5ced882e4e4100c623b7a22f8cde84702

  • SHA256

    c7ea7a829ecd2482ad41561526fb384e5d12be178c9a4e895d8a73a424236da6

  • SHA512

    66d017b6fb5717192cd35f334ed4483cf6208d5d83142d7c562e18be97bc7d48151b58d1723e4447f506b53b5737deec1b0e4871fd63a83cd9538872f7f26df1

  • SSDEEP

    1536:67Zf/FAlsM1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCw:+nymCAIuZAIuYSMjoqtMHfhf5Sskc

Score
9/10

Malware Config

Signatures

  • Renames multiple (4857) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\30432fd62f6c90d8242f79fe06914530_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\30432fd62f6c90d8242f79fe06914530_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1752

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-1162180587-977231257-2194346871-1000\desktop.ini.tmp

          Filesize

          135KB

          MD5

          f84984814ad25162259cedbe928f8192

          SHA1

          5d82a4b431aa5c7a1b3585374ac49bfa6f1c3212

          SHA256

          78d6b8a48ac8ea0d03a9dbb363ef3641b2e90a76bb3962cfc6023ba6f8e03965

          SHA512

          621cc3e307eb53a3995b704edf5bfdaec2db6ad3a6a26fe8f074ce2a510b85eb354660ab13f04ef4b6425e2ca8c805b486764823d648f2528349e7f694703f4e

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          233KB

          MD5

          f333886fb900a17358f13e39ec29bf3b

          SHA1

          e73436cb20aa2697748cfb3f269e83c9db40bd95

          SHA256

          4a9e09fcf0076a04bb635557c6f0066ffc96ca8991d725d3bd64d77aa69d566a

          SHA512

          82350aff5e6b9c6ca2c430d20348a7972c488dd996d051cda7d63dccebfb0d19f04f8b113430ab11bf97d74fc8f5550a3769d17dcc0395fd99bfa6979a9e93c8

        • memory/1752-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB