Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 23:15

General

  • Target

    54e01dbafc698e3026190944909278a0_NeikiAnalytics.exe

  • Size

    53KB

  • MD5

    54e01dbafc698e3026190944909278a0

  • SHA1

    179f4b4525906c95da84f71bcf498bc4cf6cd13c

  • SHA256

    57738c6c89801c89c99d93c524e914ecc1f384d05d02f49098ecea1e497f53be

  • SHA512

    019d5cea6da96be5436bb0cc73791cde80a6c337cd64c079b678d4c813d4420917068958985985dc6c0b7c3adde5ab280a2bed81cff4385e371d261293c99119

  • SSDEEP

    1536:CTWn1++PJHJXA/OsIZfzc3/Q8yiuaa1aaz:KQSo1aa1aaz

Score
9/10

Malware Config

Signatures

  • Renames multiple (5030) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\54e01dbafc698e3026190944909278a0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\54e01dbafc698e3026190944909278a0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:4892

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1337824034-2731376981-3755436523-1000\desktop.ini.tmp

    Filesize

    53KB

    MD5

    fa375ccb3a87401820f5246bcdb43b33

    SHA1

    6dfcc4d8175e747de11ed01858269261a2a90495

    SHA256

    9d99125af257654ced2ba5a9396b71daa307dd2f8d70ac4198df2f407152f5d7

    SHA512

    7175082d08fba02264c8cd62020cb50c447ee9cfd26799dc0dcc1fc4e84f985f57d3b714e2e96baabdeb3bb29ecf8c162277e8af901b439f0e334f7b0bb3c5a9

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    152KB

    MD5

    54e7f27d32d517399c2e341d5446f941

    SHA1

    d34af8732e5e450801aef40d98bca200dce18bd1

    SHA256

    6bf7ea77f56d6f2c3a0550ed571ce460d67b15ef0e1fb1e3722c17d3b587d39b

    SHA512

    d125798b2b4f13855b419b251429535ae0c1d32e7996c306fa89e3ab9c6145157a7c71b78d9375db5843a07d4f2032c894298434da72d63fea9fe2739caa384a

  • memory/4892-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/4892-1084-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB