Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 22:46

General

  • Target

    4fded5239363b119a9a65348573ca630_NeikiAnalytics.exe

  • Size

    74KB

  • MD5

    4fded5239363b119a9a65348573ca630

  • SHA1

    c44eace8f4431dd1574377f745f86194d42541cf

  • SHA256

    0e6bc29b814021e40b06c16b703ba8852e677f6e529ab81f27c1309d6ec29b65

  • SHA512

    8211e9d376d3aee9c7392ccc6e456ddb4faaf8b5b21762505b96ea15df13891d93cfa4032dd5fd7830d121c0dd22de5503ace01478a1d801c0f241ed7e51ee7b

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8yil:fnyiQSo0

Score
9/10

Malware Config

Signatures

  • Renames multiple (4868) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4fded5239363b119a9a65348573ca630_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\4fded5239363b119a9a65348573ca630_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:900

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-540404634-651139247-2967210625-1000\desktop.ini.tmp
    Filesize

    75KB

    MD5

    4fd4ab3251abda4c704bd78200030085

    SHA1

    043ebd6d32ae33bdf872b3cb76b9bb1c362002ed

    SHA256

    445d2ccccc19cfdca0143d6043d75cdfd737408e38c5c459abab96b1f792158e

    SHA512

    88ab73d4de64bc98c0b45a9a0160332606204b3189fc1c17b5bcb18b5ed3bf8904e090c1b836744dc4c004dadf3f7531e62eeff5cd9082df5a28dcbd370a9a65

  • C:\Program Files\7-Zip\7-zip.dll.tmp
    Filesize

    173KB

    MD5

    fd84a4e0ad8c5c20a10d0bcaa70f7c6c

    SHA1

    357287a1614f858711cfa179ebae2e2517a203a7

    SHA256

    639ae43568998efdd90f8b676285a497b02b8ecf00f1b9ef2ce6940de2633a41

    SHA512

    c43722d1b3aa1cbb1e32eb403f8eca78f292b0f55b114cd8089e509453214c6573ab0dee68564981d2f0b3cf6c10b5426980324e3c81a8b1c8a509f827c51376

  • memory/900-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/900-1802-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB