Analysis

  • max time kernel
    149s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 21:37

General

  • Target

    41f01e35afe5f7ea68ef58f5f68d50c0_NeikiAnalytics.exe

  • Size

    217KB

  • MD5

    41f01e35afe5f7ea68ef58f5f68d50c0

  • SHA1

    c500d41d360e14ae7099ddfa8dd456c78db9f4bf

  • SHA256

    07a1e9d22e31f238ce86947d87850e74cc516bd8b8baffacdd05a8b5286e35ff

  • SHA512

    cb57e3b52c013c16bd2d44d30906da21f85654e7978c7affd8a83b5831d50ddad9b96888d93524c1d34db4a1fefe07d99fd02386cd3b8b2e5118935b5baf9371

  • SSDEEP

    3072:+nymCAIuZAIuYSMjoqtMHfhf9fAIuZAIuYSMjoqtMHfhfA:JmCAIuZAIuDMVtM/LfAIuZAIuDMVtM/W

Score
9/10

Malware Config

Signatures

  • Renames multiple (4618) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\41f01e35afe5f7ea68ef58f5f68d50c0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\41f01e35afe5f7ea68ef58f5f68d50c0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:4500

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4018855536-2201274732-320770143-1000\desktop.ini.tmp
    Filesize

    217KB

    MD5

    3f6a85eb6f8922925286ca8a8381a15a

    SHA1

    66eba125b9f2b0316b4dcac96590572db535984c

    SHA256

    24afb6ec5384eceeef92efb244a1b00a4216afece9c21a3bd186abbaeec14934

    SHA512

    ea579e1a8cb42428ecf923e28698318ec626bca85527d5eb5ace655495f41e501f9cf8e39f40e8c269490e8890446561fc526ebaa32460c8fdd14383b3dfefad

  • C:\Program Files\7-Zip\7-zip.dll.tmp
    Filesize

    316KB

    MD5

    8329b9913150c789e809c7859971b1d4

    SHA1

    68ad2367da6d92acd8bfee2784a54b400eeaf056

    SHA256

    dd935a9fe4fd6f8bdbd0b0d5beb1fd8fc7da7c4daa768c9ee6677267f3c001d9

    SHA512

    e32eb74750cdae8b0c64fe7724ec8da16eed10700a9646bb3c04f826f8301b58497a008565c700499615fadd052787120ca7de1a8d57f32d46d615f4f13c6376

  • memory/4500-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/4500-1604-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB