Analysis

  • max time kernel
    150s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/05/2024, 07:51

General

  • Target

    a7d72d08689ba1701dda70eee0482cd0_NeikiAnalytics.exe

  • Size

    113KB

  • MD5

    a7d72d08689ba1701dda70eee0482cd0

  • SHA1

    2d90b3d3e018c87138b959da8e60c8d1ee93e3c6

  • SHA256

    1b42e0ccdf750f7f7ca9d874609534850ab5bebf21327c71abce35192337ef5a

  • SHA512

    66305a6fa2826020be5a3aab0b13611aa5ee00ad8d924b43e454424c6e3df7d24ff8b355c53fa93b12bd8d8d8bc58cc513b18b98b8b82336e59938aaf03a937f

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hf5Sn:hfAIuZAIuYSMjoqtMHfhf5Ssk/62

Score
9/10

Malware Config

Signatures

  • Renames multiple (5124) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a7d72d08689ba1701dda70eee0482cd0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\a7d72d08689ba1701dda70eee0482cd0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2588
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4356,i,15142778360084620907,1763097090506261076,262144 --variations-seed-version --mojo-platform-channel-handle=4428 /prefetch:8
    1⤵
      PID:3672

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-1181767204-2009306918-3718769404-1000\desktop.ini.tmp

      Filesize

      113KB

      MD5

      a23be29e0a1e17d56bbc1d5f7e043ac5

      SHA1

      4a06b43484cd78501496cf4841f2efcc4cca05d9

      SHA256

      405aecf8dfac305077522f1041e10860c1274526ece5642b5af52d1e746d4564

      SHA512

      09d365be47dab41d9189bfa22c80a8c0903010b8045877884f2a907a6904a8d058dc4f4faa082b3a9560973debc2f532bead74b0bde465aec717164233f27bcc

    • C:\Program Files\7-Zip\7-zip.chm.tmp

      Filesize

      225KB

      MD5

      6dadb9dc1d817a55fd377d0ffd07d655

      SHA1

      8baf4fd5184b924031635bceeb639273752a05d8

      SHA256

      507366fae531c3413212b830b4657c97189844888e1e1ba2871aa1fa9f816364

      SHA512

      3241e9d45494550c33c9d0b4652ddc562f4ba274e34993362c9b7a757687d9b4d4cc88e15894f7183bf1af6c1e67a5dd9aa3100347979654b200c16a508542e9

    • memory/2588-0-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB

    • memory/2588-1090-0x0000000000400000-0x000000000040A000-memory.dmp

      Filesize

      40KB