Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 21:51

General

  • Target

    44cf3d6a0dd2d109dca13ade9f440ac0_NeikiAnalytics.exe

  • Size

    233KB

  • MD5

    44cf3d6a0dd2d109dca13ade9f440ac0

  • SHA1

    9c08fa245c5d236f352bdd0bfafca091c7e9fa34

  • SHA256

    7e3acd00f381e0bd2ddb873f98ab0468b1837f2107cbfbe60c6210a604ebacdf

  • SHA512

    c5af94893c102b9de19a57b21e292db04c3369d34049454834aa8af0817a75ea5fab8e80ba1de0693411ede8ead6ce71eb4a6304bdb09edc8586b98ae36fd3d5

  • SSDEEP

    3072:+nymCAIuZAIuYSMjoqtMHfhfFfAIuZAIuYSMjoqtMHfhfk:JmCAIuZAIuDMVtM//fAIuZAIuDMVtM/m

Score
9/10

Malware Config

Signatures

  • Renames multiple (4571) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\44cf3d6a0dd2d109dca13ade9f440ac0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\44cf3d6a0dd2d109dca13ade9f440ac0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:516

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3558294865-3673844354-2255444939-1000\desktop.ini.tmp
    Filesize

    234KB

    MD5

    d6f83f3e0aa6568df2bba2d03d7be4e4

    SHA1

    2aab502f9c63ac63686a504c5b4693ea2bee3d8f

    SHA256

    f5b1d67d086c2fef118f1acfaa1372ebeabf9505327e193160132f322e009dd3

    SHA512

    4e589b289ee7b4193c91e709667b47211b8dd62e3360b7a5f71b526f6bb72061a7180da56e2e2a2b79c2d866ffd6518419422e76b62e2c9791b3a954c7bb7fb9

  • C:\Program Files\7-Zip\7-zip.dll.tmp
    Filesize

    333KB

    MD5

    f75443687a0f508e8937fef870671ac0

    SHA1

    91e66c708279aa184c518520d5fb87dceef1b07e

    SHA256

    fd6c6964b6cd43cf03e714f073a46608bea986fa19404cbb7ed5494d2cb5042f

    SHA512

    9564ed085541c48fbc17e7aa111bcc5a59a46953bbb61e75cbb8e70941e8132de1d8e1e7ab00b3cefe257b790c0332e17f503df7a4e486149ed3375a8fae1dcc

  • memory/516-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/516-1480-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB