Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 23:00

General

  • Target

    529c162c8be8d29a918083924db8e0d0_NeikiAnalytics.exe

  • Size

    128KB

  • MD5

    529c162c8be8d29a918083924db8e0d0

  • SHA1

    726d9eed1882299825e8477685ecf23897ae3b5a

  • SHA256

    49bd0c406726526c6e068f7b2ca20617c3e9acc280660671f4b093bf615777e1

  • SHA512

    9cd2740bf95102b026b06b105009104b9eb17da00860da2b101cac36d3896adc1e2716e55b94835d865e95c1ed0282081cf64ba1b3f4334427c7204321dfd0d3

  • SSDEEP

    1536:67Zf/FAlsM1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCm:+nymCAIuZAIuYSMjoqtMHfhfL

Score
9/10

Malware Config

Signatures

  • Renames multiple (4819) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\529c162c8be8d29a918083924db8e0d0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\529c162c8be8d29a918083924db8e0d0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1176

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4018855536-2201274732-320770143-1000\desktop.ini.tmp

    Filesize

    129KB

    MD5

    0072f3bf66ba7c42b429e8b054b3156f

    SHA1

    92a8fd157718d04a70f781dfa4f9472aec15c3da

    SHA256

    bfd1da1ecd09bfb050fe1fbdbd8dee45f33b1105ba73a71e427abd687506d7ea

    SHA512

    e94787e4dd4caab03913950dacf2815c156c61b9c75a6160444919cd004a23e897eed457b74e239bdf8bf95588348a27cf156d054634d43f521a3ecf7eda78ad

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    227KB

    MD5

    5a20d9899976e6375471caadcbb8cb60

    SHA1

    9630e6ab263b5efacca332b32be9ecdc01970700

    SHA256

    8f8c7146d09f027ae651cf31f188ecd853225bd3a88b87aca88afe6d6aa92770

    SHA512

    779269d8b2681bc4402c663555b3605a45c4e9996572105ade6647381a8b4d0f4515645421baa740485d29ac98783deaa1173d0a9b842745cb6ddfb366d16a44

  • memory/1176-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1176-1746-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB