Analysis

  • max time kernel
    149s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/05/2024, 10:24

General

  • Target

    b2692bf64f07857cfe21e10e2c21bf90_NeikiAnalytics.exe

  • Size

    124KB

  • MD5

    b2692bf64f07857cfe21e10e2c21bf90

  • SHA1

    221565275cdb1090e4b08f48b4fc4c22b042fb47

  • SHA256

    839f4c30301b5ef4e7b842d222025a1d87db9b4caf9af1a323c2356d2770f4d4

  • SHA512

    0b962ca00c1007c34857cb956dcc153586693d9cb2608188d77e30d93af93291f27b3171f612dfca50a6bde5a5405ab9b9d67c0ac80085861bc451e361bd6449

  • SSDEEP

    1536:67Zf/FAlsM1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCO:+nymCAIuZAIuYSMjoqtMHfhfb

Score
9/10

Malware Config

Signatures

  • Renames multiple (5029) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b2692bf64f07857cfe21e10e2c21bf90_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\b2692bf64f07857cfe21e10e2c21bf90_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:4268
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4020,i,6593821857742176458,13646536021844995125,262144 --variations-seed-version --mojo-platform-channel-handle=1308 /prefetch:8
    1⤵
      PID:4432

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\$Recycle.Bin\S-1-5-21-1181767204-2009306918-3718769404-1000\desktop.ini.tmp

            Filesize

            125KB

            MD5

            4d6b8e8f4440804e143c15b2fbc3daa4

            SHA1

            fa0a2f9f9b99132f4e28f0d7f8dd2df4d17ddd91

            SHA256

            0265c84f75f47152cfc4c559af4c2dcafd3aa8e4e373258bc2288f521e8aac95

            SHA512

            134fa2a8e231715a975da91795ce2cc4e1bc9067c8f1a27b1e2697df45044c269106cc19453fcbf50ba52ef6360bd175595f544a430f478e554b0dfe3c99535a

          • C:\Program Files\7-Zip\7-zip.chm.tmp

            Filesize

            237KB

            MD5

            f097499defb916a4ad3a0864ee5631b5

            SHA1

            a020277fd2b0b429df6b6932fbd5ef4256ee00a9

            SHA256

            92fd9600acb159d45df18c57b5c7a5831c524181fefd5e781274523c26b97c71

            SHA512

            c1ba798a81a46c6500f703380e4b1be85b9a5ae185f7e367f43c644dbb978785092d143d57e977d1f552ee5b66b7dbd2dce00a799693bcfe630b41cb34870639

          • memory/4268-0-0x0000000000400000-0x000000000040B000-memory.dmp

            Filesize

            44KB

          • memory/4268-1810-0x0000000000400000-0x000000000040B000-memory.dmp

            Filesize

            44KB