Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/05/2024, 12:15

General

  • Target

    ebf5ef8e03a6b322fdc70807f1335f50_NeikiAnalytics.exe

  • Size

    99KB

  • MD5

    ebf5ef8e03a6b322fdc70807f1335f50

  • SHA1

    226f4bba0805baf5e3ad5b1f6459f0f7a7ce3765

  • SHA256

    db96463a8ed6e9907156ac060e4e9c8c56f5bdfeb22523b0440f75ed0c4f4b7b

  • SHA512

    849f1511f2b820bb917a300e42fc20e68eb3b5a8188e09a86d9b31cf57fdec8113a955f05c2284d7f6cd89d22d6b72a823068e04c2888c42abb0cf26f1de9fed

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hfm:hfAIuZAIuYSMjoqtMHfhfm

Score
9/10

Malware Config

Signatures

  • Renames multiple (4842) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ebf5ef8e03a6b322fdc70807f1335f50_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\ebf5ef8e03a6b322fdc70807f1335f50_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:3560

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1337824034-2731376981-3755436523-1000\desktop.ini.tmp

    Filesize

    99KB

    MD5

    27129e33d2d3ec3359513da2f560a511

    SHA1

    17ae75cec223b5cae782634f6a4b22060a91ee6f

    SHA256

    77ae6cdb3de39cada8c310f93eaf850ae0f7295da7f109592d98c55e2cf8f536

    SHA512

    1e5f9be3cfa305eb0ee01783ffb68be68a1d60ca41c004ab560e9784caabcf65702f2190a2318ab1174d9abf3904800df510c4cf5ef09ec6e38199b716df8774

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    198KB

    MD5

    dc79922f45ba4152bd885756bf28ef01

    SHA1

    674676f0ff49ae72da8f41a06f6d1999366fa5d2

    SHA256

    5ac719dc77bd717bb5383a1e251499006a70a3b5634100175f35403762359536

    SHA512

    a0d711d2f204db8c3b1accd99e92cbb588929d62a5597b6b34f01f734b3936f25c1bd8344627ad9469979a1a89a776c7820796cd3483bc48d2007e098b684775

  • memory/3560-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/3560-1076-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB