Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/05/2024, 06:20

General

  • Target

    af98b6f12452e09834a84df45bb9aee0_NeikiAnalytics.exe

  • Size

    63KB

  • MD5

    af98b6f12452e09834a84df45bb9aee0

  • SHA1

    94dd17627d98c2a39706b37f784601ae612d9fb3

  • SHA256

    94db316a0e18349965c678588fd7776f6672a70b629180099c64884db3ab4ea5

  • SHA512

    77558314bcf744004339b2af8b7ead6f03f8e87439c346773ecba89d98155e76cb64d53c8bfcccc99f5171248c2932eff44feb2de73e294a0915baafba99faa3

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8ZqL:+nyiQSo3

Score
9/10

Malware Config

Signatures

  • Renames multiple (5191) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\af98b6f12452e09834a84df45bb9aee0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\af98b6f12452e09834a84df45bb9aee0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2400

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2539840389-1261165778-1087677076-1000\desktop.ini.tmp

    Filesize

    64KB

    MD5

    8935f4b4327c9c6261242333fb4f5573

    SHA1

    f64c949ebb5827cfdbe4354cb2de865e08ca96f1

    SHA256

    8d53c16fa36cf143e3ce4c8c0f2bb28191e7231f9f6dace80aea89a912f65a57

    SHA512

    8251895f7c37e41ceb7d9e745ccc6e5e94189b48f4c36a89ef5625e1c55db918c3f957e3a9b783f72e6565137531c7e5256d9b3cf38d9b8d23177fab3bff0dfe

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    163KB

    MD5

    2932de656012af8d6feee0863ee1cc77

    SHA1

    f363623e03a7ac0105ad2245db9274441cb4471f

    SHA256

    798356a8adcfb22c2b7c6ee55ccc5cef882813dddc91aa5a3891f3bb05d9f0da

    SHA512

    b246a931e265d729eec58162f6ba1ac92373b2f1639af7bf7e45afe6d1b035e8c4cb40c3972375f1107d6d2ab62705ef167df5f05d340bbfbb5f0c6b5a6f0e7e

  • memory/2400-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2400-1900-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB