Analysis

  • max time kernel
    150s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-05-2024 22:12

General

  • Target

    436807c9b4503952705eb3ac70a54d30_NeikiAnalytics.exe

  • Size

    130KB

  • MD5

    436807c9b4503952705eb3ac70a54d30

  • SHA1

    beda439ef4da2c2afb38ba954122b5a5e599ca93

  • SHA256

    c1ea548c44a92cc49cf7d0d6ab62a0f496c82c3542591ec5f3e472dca08c4554

  • SHA512

    5712c6b4f43e471eefedcb81952b2f08818f270c8dadb1f22191ef1fb6ced797d856c1c75e27e33c7c3d579606c35595bcc9c62cb05fede59493c9e09210ca37

  • SSDEEP

    1536:67Zf/FAlsM1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCz:+nymCAIuZAIuYSMjoqtMHfhfy

Score
9/10

Malware Config

Signatures

  • Renames multiple (4685) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\436807c9b4503952705eb3ac70a54d30_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\436807c9b4503952705eb3ac70a54d30_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2340

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4124900551-4068476067-3491212533-1000\desktop.ini.tmp

    Filesize

    130KB

    MD5

    50185c0adad708b05f8f53ecda3fc4ee

    SHA1

    e1ed5823e699cd1ae951a3a1250e76c8149d728b

    SHA256

    d2b4649a4dc7a06c0bb95b1914d499a085cd9dacf8550d0d5ccf41f6e4076cab

    SHA512

    50d1e71b21e7b0fcb9544fe290226955453319fcadb11be298656895d6295d258c2f0ec69f49fc97a11b64b1aa5289f6cae8350610cd0af6d547d33e9e4b6e38

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    229KB

    MD5

    f6dfac68096066ab693e7f8202f9c7e1

    SHA1

    032a88771d53119024982be893507c3b55e5f0f9

    SHA256

    a5dca02898e9ae34d414d63e11b0bb4e83414a3cef28f2e9f34406d4b09a5663

    SHA512

    8df2e128dc39f414d82bbd4d45032c7cbae670bf4e00147e734cf9f1dc0be00204d1e7faa53970b8e95fdbc5610d5623fb633d2164a2bf6720b5fa8b9933d857

  • memory/2340-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2340-1698-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB