Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-05-2024 23:35

General

  • Target

    55b902397ca78a49c09c1e62bdbf68f0_NeikiAnalytics.exe

  • Size

    138KB

  • MD5

    55b902397ca78a49c09c1e62bdbf68f0

  • SHA1

    12688dc6ce9d0dc01bf4fdc81810d8d0b4980ea9

  • SHA256

    4dfc11915fc8aa1d31d6132803fed0c69d6b51d44c0de5aa1fd840ddd009aa07

  • SHA512

    db954210787726b8dd2cd71b47df08b1a4cfb4efa663550686d79db78734df8a8aa5739c7a98fbec295a35e9832797defe9a8761518b9f04444f9a5a11318010

  • SSDEEP

    1536:67Zf/FAlsM1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCC:+nymCAIuZAIuYSMjoqtMHfhffPn

Score
9/10

Malware Config

Signatures

  • Renames multiple (4872) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\55b902397ca78a49c09c1e62bdbf68f0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\55b902397ca78a49c09c1e62bdbf68f0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:3064

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3558294865-3673844354-2255444939-1000\desktop.ini.tmp

    Filesize

    139KB

    MD5

    7149d956d13fbc60bfdb9f14f54a70a8

    SHA1

    eee02c111236e7e7fd96c3e465a9a6374c3deeb9

    SHA256

    e1e053eea72ccd356f8b797653ac7ace0baa81967aca1e16b69771d83dd274b2

    SHA512

    b426728c6ae28ab34821f2091e828754c84f2f81811d60cc220a4781f84597dd1ac58456c7fa2c0727d0a3d422e0a20c1deffcaad3b1c7d817e95c6f307b5ba9

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    237KB

    MD5

    56756348fd317aff4af1489de5636b50

    SHA1

    ed39aeecd3d6732299eeb8deffb13991d4fe9219

    SHA256

    00b0f3cacebea3fa815209acc0a377aab67688008a218010aede97d3d1e11735

    SHA512

    fcde5b7b60bc81c7baa7239eec802451973f028ebe68c71cace47619bda44d04ea0a3d20b1b9cd91c1d97c89293660ccf1430d6f46cb6936e4a8ecefd33da482

  • memory/3064-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3064-1784-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB