Analysis

  • max time kernel
    149s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-05-2024 19:25

General

  • Target

    0688130e6e945006f2472fd31a8bbdd0_NeikiAnalytics.exe

  • Size

    106KB

  • MD5

    0688130e6e945006f2472fd31a8bbdd0

  • SHA1

    7129c18c26cb82044925acd1715f38ca5460052c

  • SHA256

    53c864b18c6356bfe686b33f1a246670c229e222cb52e8ab0adef2df3047114a

  • SHA512

    1277a63009437553eff46191db849ef5c2f5065ee540ff5469aa90cc3a59a6aa13fd57e88eff744ab7b71e3b81ae38a77334a545309f4c2f77bb9ce146a5351b

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hff+I:hfAIuZAIuYSMjoqtMHfhffPh

Score
9/10

Malware Config

Signatures

  • Renames multiple (4716) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0688130e6e945006f2472fd31a8bbdd0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\0688130e6e945006f2472fd31a8bbdd0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1192

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2539840389-1261165778-1087677076-1000\desktop.ini.tmp

    Filesize

    107KB

    MD5

    966d3ea0d6cdbdc54f3b0213b5ff56bb

    SHA1

    24aca8403f12787d9f8695a6909161a185618da0

    SHA256

    73cb22c083cb6b75f5d0b5fb18978d038531b4d70237251518a4866f6b42535f

    SHA512

    5fdcb8858af4e637908ce4210159dd848c91d8b0e4f2070768befeaeff684e8c636e54bcfd5450095ca05229a012ba62a99d162bad79f84a2ce32cae0deefbba

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    205KB

    MD5

    4ef0f6a69d38c06735b88c8b362a7ee6

    SHA1

    c93ae08e1a2d7daa8dd7f76ac37ce8383053709a

    SHA256

    c4fa557105420968b61ab9735aad869d9eb66fd353b2ae4b2ab411a546bd9c16

    SHA512

    c7fe3fa4a79aae044d6d2dc37a62c218b661b615a5496cfff283ac8497df885857486ab5d145ddca70aedc57b6bbd84caea1cd947709e462685b458e41c82d1c

  • memory/1192-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1192-892-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB