Analysis

  • max time kernel
    150s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/05/2024, 22:26

General

  • Target

    469ce72d61eb4f4cae649c49bbee81c0_NeikiAnalytics.exe

  • Size

    168KB

  • MD5

    469ce72d61eb4f4cae649c49bbee81c0

  • SHA1

    459b97264f614cdb0df2e6cf7187db14c8f39c99

  • SHA256

    69f92a25d20b2f1284d8d3341053e51b151903de6574cec11f75c41508aae5a8

  • SHA512

    1417e57355c44849c2b74ccbb1e2474e8185ce2bdab07120aad377fbc5697f1ee348163395847bb2f7ce93fd1c682d153d965c7e5bbb4d8849a1b9193a5ca236

  • SSDEEP

    3072:+nyiQSo1EZGtKgZGtK/PgtU1wAIuZAIuF:JiQSo1EZGtKgZGtK/CAIuZAIuF

Score
9/10

Malware Config

Signatures

  • Renames multiple (4714) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\469ce72d61eb4f4cae649c49bbee81c0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\469ce72d61eb4f4cae649c49bbee81c0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2176

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-711569230-3659488422-571408806-1000\desktop.ini.tmp

    Filesize

    168KB

    MD5

    88562254bf94bcb0001243b3e3be47d1

    SHA1

    2fceb8e058ab122ddb63f8a3a587578080d9b43d

    SHA256

    5767023d9994ddc75536cddad5c9b981d965c89ac44898e174f3a903d95bacda

    SHA512

    e3e0f2c0aa1df1728630a22d8926249076ae2b7c3b53a496887ca571dd60c9843fc9f808a517dbe0ac9f53c75e9a6a6258557e64e8f5b736d5489b65854dbd28

  • C:\Program Files\7-Zip\7-zip.dll.exe

    Filesize

    267KB

    MD5

    d0a1cb3760d4f23a25fda1a8f9702fbe

    SHA1

    b94014371faf27ef678a46dc41d67c2dfb6d1fe5

    SHA256

    ce394b988697d67b61ac8b04dbf59eb33618ce4986a07c84cc8aee6e70947948

    SHA512

    efa066a945ac9e550a8f3d5e013902edd1332ff6fc44f19aeb29a4c2a54eee4692ccd7c64538fdcfb359449b17bb22ab34b1770d132a9457d4dc49c87839f333

  • memory/2176-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2176-1628-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB