Analysis

  • max time kernel
    150s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 20:15

General

  • Target

    a1903136a42bffd55b51d1c260e038c0_NeikiAnalytics.exe

  • Size

    40KB

  • MD5

    a1903136a42bffd55b51d1c260e038c0

  • SHA1

    0548edf16967861e18b454ef9ee547ce4c258e67

  • SHA256

    af6f228e74b7a09c9a6d2cc48e5d0fe69ff1db16154699cc2ee9f74b3be3d974

  • SHA512

    969f825e7c70a76724bcfe2b344067a3ba0f41dd8249bab08eba0965b84af829489b60d46c86c3b2e2a14774551da3141ff213b30cca1f1d2ab8b6ebfd0364df

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAF5:CTWn1++PJHJXA/OsIZfzc3/Q85

Score
9/10

Malware Config

Signatures

  • Renames multiple (4678) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a1903136a42bffd55b51d1c260e038c0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\a1903136a42bffd55b51d1c260e038c0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:4056

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1162180587-977231257-2194346871-1000\desktop.ini.tmp
    Filesize

    40KB

    MD5

    4d83d90920a8123cb5b480eabd99ec34

    SHA1

    426d1756dcef893a2c79a27f5f0de89c7b7a3b9c

    SHA256

    f0ceb5c25151b67159920d2d530886fbd9c0f77eb20505ebb27bbab10d35bab2

    SHA512

    399f26735f3def66ffdfbd704729429822c0322f31641b7e4a702659894eb1ce815a1987b09fb73c4e306ccef05bf5df6e8cda3c1d8a5d80b16e272929e28340

  • C:\Program Files\7-Zip\7-zip.dll.tmp
    Filesize

    139KB

    MD5

    bad2cacfed64aa1abe9c2eb4b55ec7dd

    SHA1

    b16d258d943b3ccf28923f9948dea6dec7bafcd4

    SHA256

    bba46fb9dbbddcbda1fc3a52378accf29972804a663749e1a9919b596faa1705

    SHA512

    c66539a865cdb26f48b8bd16d80aeff1796446efb32a0859c94ac3cdb9af70a213533ec771526e0ff7eb5e2627bf0d6ee58307ec443e14b100abe7922aaa072e

  • memory/4056-0-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/4056-758-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB