Analysis

  • max time kernel
    150s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-05-2024 16:17

General

  • Target

    ef80f5ee00761e8c506b2976ac6b1760_NeikiAnalytics.exe

  • Size

    106KB

  • MD5

    ef80f5ee00761e8c506b2976ac6b1760

  • SHA1

    51c2b3beb02ed7464e354f15e5498186809811ee

  • SHA256

    8e4eb4737b287618843f465d0b02a9a3242b24f9e47ee27732c42f822c3f47b6

  • SHA512

    0c4a75621b5d5abf73485acf84fdd4c3b3e2c069391e1b838d2f44e66bd9ac72e42a652b4460dcaa35e932d82c9a6710ef32cf6cfca889fa9ab6f3fa7ebeb0eb

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hfRba:hfAIuZAIuYSMjoqtMHfhf0mQmo

Score
9/10

Malware Config

Signatures

  • Renames multiple (4874) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ef80f5ee00761e8c506b2976ac6b1760_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\ef80f5ee00761e8c506b2976ac6b1760_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2476

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4124900551-4068476067-3491212533-1000\desktop.ini.tmp

    Filesize

    106KB

    MD5

    a6041b89e29a3e22077fc86255755ca8

    SHA1

    ff60900fe177d869f8785097a57b0ad6b3e31f29

    SHA256

    dd192376a1803c0fa597951f5aef7a29dd2d6767248d795b1959bf300ffa6381

    SHA512

    14282a89fcd0b0a40ed3d04231fe5c3a04b93402f4737521d170b57e1f295e28d9ddb873e303a21434948e4a4286975748f4aeb0e31d62be81332476efd911b5

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    205KB

    MD5

    2248aa40aebf0017b14f3ad9aa583006

    SHA1

    7c49a84c8cb34abdeda5be15065bd2e7d8b77272

    SHA256

    76cf53a35c2582491bf8dc75f3bd95568c8a2d33e24bbf58a6a35b4db025e802

    SHA512

    c7e392ec8666417e0324dee4358269211236c01ac2da09f3a41a708f57a72db454ae4fd04c43a17e28358f92e1bf4984394d5494b923fd10f01f3a86602665ff

  • memory/2476-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2476-1032-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB