Analysis

  • max time kernel
    149s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 21:37

General

  • Target

    41d2c387f470e6406be9bcde57772610_NeikiAnalytics.exe

  • Size

    219KB

  • MD5

    41d2c387f470e6406be9bcde57772610

  • SHA1

    a6ba31e69cb629d68ab7dd408dae7b06b6787747

  • SHA256

    5b5b3fb978809d16969dea2a09186f085405b049792348f5b8af3b3d8cd67330

  • SHA512

    8bdba481f05b4b55541f4730b050faf6fb064c780c281e562a15064c987f32337e82f8069782d6b4e8a85ea7fd2f9ca86194c7c3897a211b837fb499310ef6ff

  • SSDEEP

    3072:+nymCAIuZAIuYSMjoqtMHfhf9fAIuZAIuYSMjoqtMHfhf+:JmCAIuZAIuDMVtM/LfAIuZAIuDMVtM/4

Score
9/10

Malware Config

Signatures

  • Renames multiple (4367) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\41d2c387f470e6406be9bcde57772610_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\41d2c387f470e6406be9bcde57772610_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:4740

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2539840389-1261165778-1087677076-1000\desktop.ini.tmp
    Filesize

    219KB

    MD5

    b653feb65a47d793d1c27c37900ea017

    SHA1

    683a2cf9e484a9a0ca5ac69e5ec4ee30e41684c5

    SHA256

    e47f806a2d37f2ffd299c9fae5c502ae4298616f3b25dbc880cf06724444d696

    SHA512

    d567666a6f5492ccb8187a4990e91ddf9bed09b4b35a75a0d4ff65a9d7a633015d769fd4b6983603a028aa3405a71550e844677c749d9d765b87e93d8e93260f

  • C:\Program Files\7-Zip\7-zip.dll.tmp
    Filesize

    318KB

    MD5

    5854aff56ff09303a48a87a269003174

    SHA1

    da972b8431064f56b0ccd47bd09bb87d1702276e

    SHA256

    be0b3652e6e877b804a03756435144e5c8785e0e589bfb4f8347d9bcfc7fad2d

    SHA512

    56d1b21314481ce1a90040b6a7eb0740c6042c998814e89ed827e09303d55ae30a82840776201ab985ed8809bda216a000c266eb5d5ef655bfe29a4aad4a7c20

  • memory/4740-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/4740-1468-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB