Analysis

  • max time kernel
    150s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-05-2024 22:14

General

  • Target

    43f51244e9354228cc97beac972292a0_NeikiAnalytics.exe

  • Size

    158KB

  • MD5

    43f51244e9354228cc97beac972292a0

  • SHA1

    e0b2bb6e004b17a93bad820276193c5f873e3062

  • SHA256

    f6eaa399be182c3d3bc1fcf84b43cda8cd915c79896115afa887cbf4bc5aee56

  • SHA512

    d680c3670d6c752b9e9a7e8ea6bb6846dd8621a7197a3eaccf786cea7f11fc92d77643e196e04536515bda9ae4103a46e92e0008839b2f3938d790c4766deb1b

  • SSDEEP

    3072:KQSo1EZGtKgZGtK/PgtU1wAIuZAIuXwFwtdB:KQSo1EZGtKgZGtK/CAIuZAIuR

Score
9/10

Malware Config

Signatures

  • Renames multiple (4737) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\43f51244e9354228cc97beac972292a0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\43f51244e9354228cc97beac972292a0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2244

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4018855536-2201274732-320770143-1000\desktop.ini.tmp
    Filesize

    158KB

    MD5

    12e19fe5a824e71288d8b5f993f33e27

    SHA1

    6c266bb28df05b66dd6aee222c1817f5e07cd3e9

    SHA256

    56fdb345f1df67c159fb4c8a927cb33af439b397a000b21ccbdfe855d460b819

    SHA512

    d03aff3016b9476b2ef2d432c2a38065ace6b7a5067a29990daa39b01c58c957a6d23e725b2c3c5b15595db9b305fd1d0da9f1719f96d4a01bde31ab61c8d9a0

  • C:\Program Files\7-Zip\7-zip.dll.tmp
    Filesize

    257KB

    MD5

    80756905133fa9893066267aaf71028f

    SHA1

    26788e6793b1d6b5355c41c95c39e79b0a4bf841

    SHA256

    726b4de688c4b296c02cc0521f745df52fea5f42219c27c0318811fc2145d46a

    SHA512

    b364a93d5bd81623fa2012fdfb83f735d434d44d909f2fac6633684396829706155a8b92d4b92882aa9806c854275e3eb31bb250bb8ef2b49b065fe2f5029183

  • memory/2244-0-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2244-852-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB