Analysis

  • max time kernel
    150s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-05-2024 05:09

General

  • Target

    85cc1368d47d3ce40d24475979ed89a0_NeikiAnalytics.exe

  • Size

    106KB

  • MD5

    85cc1368d47d3ce40d24475979ed89a0

  • SHA1

    647f3c7158ffaad95260ba6738a0b88dcb4d913a

  • SHA256

    2df135b55b592de9a3099de74c7b56a25c9c31b3037b2d1de563befddb4311c1

  • SHA512

    f4868091629fad6abbf82923e5f90c937bc528f2788fe3e4cc72b64a86b7376c61556bc1bea89282dd0695771372eb2f5dd2b1a0e4ddb125e8ed7d92aeec3f7e

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hff+Q:hfAIuZAIuYSMjoqtMHfhffPp5nh

Score
9/10

Malware Config

Signatures

  • Renames multiple (4910) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\85cc1368d47d3ce40d24475979ed89a0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\85cc1368d47d3ce40d24475979ed89a0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:3588

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-540404634-651139247-2967210625-1000\desktop.ini.tmp

    Filesize

    106KB

    MD5

    81207e3f3446227956c3fb66203679ef

    SHA1

    a06b257ac2b2f67e68eee8b7a04cdb9f8201945f

    SHA256

    4bb26be68895ea7cd4958783c437951d72ed231eec97719a11d1501a4f660898

    SHA512

    55a400c88c633f4869563dc5655e5cc823c88f994e0c8d660780fd0d212596d7eeaac916b9a5ada04474e9508b48499f05840aba5c97093ea86beed31fae3bbd

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    205KB

    MD5

    ec9a9e3d93f4ebdc466052e0a19aa36a

    SHA1

    8465dd0dab4ec15114108190b3e853743b0dfa99

    SHA256

    7608e386e37a9dd29948a1719d16c035f27f729076bca898dec1acc69c4e2d52

    SHA512

    fe2c20aa0e448b96a0cf53533832eba58f7d5d5a21652843fe88def06aae10ff9f41643fd42baf0c016064fb2300a4bea8f935ab237e047c645e27a9848f0674

  • memory/3588-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/3588-1006-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB