Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-05-2024 15:21

General

  • Target

    e300fb26c26639f0276c74c86282dfd0_NeikiAnalytics.exe

  • Size

    134KB

  • MD5

    e300fb26c26639f0276c74c86282dfd0

  • SHA1

    9410d4cb0e5f3c0585763147de2aa9dfafce212c

  • SHA256

    e08f0cf33d23733f735da776b2a7e73a1315106c4b271a665e571f4ee9653709

  • SHA512

    4cbaaf986aa8d991b0bd3fd8df80d641448c4ea90a96f5352a03f96d6e92c8cc101a6987f3f0a887830a87f82d7e6d67c5aa9927c47cb185f204bb5b0b413a71

  • SSDEEP

    1536:67Zf/FAlsM1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSC7:+nymCAIuZAIuYSMjoqtMHfhfb5qea

Score
9/10

Malware Config

Signatures

  • Renames multiple (4838) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e300fb26c26639f0276c74c86282dfd0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\e300fb26c26639f0276c74c86282dfd0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:220

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1337824034-2731376981-3755436523-1000\desktop.ini.tmp

    Filesize

    134KB

    MD5

    c4331cccfd0da498bb72b39c261ce4fc

    SHA1

    eeccf1219fadc66c7411af9b6b0577da7aa6b4a3

    SHA256

    c7d13fbdd8011ccf955ff21a87f6d88467e96001bc9e2e4d749c2b24d50c264a

    SHA512

    b573cb2b5fa895ad019581720f35bfd0626d1cdb0d58865338d3007a97988cb29ad5a81f16cec90fdc315fceadf15a1fec63c821c13f3d36a065a8ffa0b94d86

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    233KB

    MD5

    88c9b4d26da891aa6b8b5beef09e08b1

    SHA1

    fec7ed838439525eea047a6bb3d1afa2a319bf55

    SHA256

    e1f61581a6a933dd30b9ecb2d9710e5f846dec3e6d62511c7e659244376f99ea

    SHA512

    8dff232e809082b250785c39f14290904f495bbc4e794d638ffaedee7ecbb144ff6559c885731357843103bea633067395a1ef2b44d8edde16f20334ad7d08bc

  • memory/220-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/220-1796-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB