Analysis

  • max time kernel
    150s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/05/2024, 00:12

General

  • Target

    5e5f60de96b2f104d3ee302f8ee64b70_NeikiAnalytics.exe

  • Size

    109KB

  • MD5

    5e5f60de96b2f104d3ee302f8ee64b70

  • SHA1

    da3d954f1220effa79189726b5bda250d9f86add

  • SHA256

    9f9e55b9337c329c9c8809f19dc69c2a7370fe8f60b9564648b13bbbb4486a36

  • SHA512

    2a0606ca46e7bc09488db775cda460489ed3d1dd4806d32833a9813660656283bdbde8c715498ac931a74bbf755cdb7a050043deb79b92c1c815658c1eced951

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hfRb1:hfAIuZAIuYSMjoqtMHfhfj

Score
9/10

Malware Config

Signatures

  • Renames multiple (5020) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5e5f60de96b2f104d3ee302f8ee64b70_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\5e5f60de96b2f104d3ee302f8ee64b70_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:716

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3906287020-2915474608-1755617787-1000\desktop.ini.tmp

    Filesize

    109KB

    MD5

    48641a2f40f24081819b1c8950ddc08f

    SHA1

    6e508f5e896311503d7ff5e7d8946da8cf813cc3

    SHA256

    ff49bf73b2fc2f67cdcfbf610193f0ab6b7dd4add96525106644deb41767df8f

    SHA512

    651623b683a6e5d34e8c4a72ed7335be2a29b56f5773a0747c263ab5104cc1946c125905813e2dda317811d74a9183ae35c3e4982afe1fc04dcf74eec9bd0491

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    208KB

    MD5

    9a7e15e4e8baa65cad7b8974be4e96ec

    SHA1

    3b8d40425dc82d449499abd0a38d95b23557e513

    SHA256

    5a10558f30e87a86bfd1fb0f86ff478b334e3525d685e6dff5b34909f177e3a4

    SHA512

    bf9d8edda09a0669f55ea41c5971130b9dac0946f4422b4ed28e987f0e125ddaa6e10ef75e105728fab65f037dc233dd42cbe1f33a7c981a85120b3c5755ecd4

  • memory/716-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/716-1082-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB