Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 20:24

General

  • Target

    0e624c0f7be4c9882871986836da4e20_NeikiAnalytics.exe

  • Size

    59KB

  • MD5

    0e624c0f7be4c9882871986836da4e20

  • SHA1

    1a6bbb95d5b8b697db570ae29294562fae7f3c3b

  • SHA256

    c2057f2b7572393607de40beb4596e6288ed602ce5db9dc260178f291ea3ea57

  • SHA512

    2cdf6514a60a236a0b3f78d5f6e9435b8be3487698041ee7674571b6bbf208f4d2becdeb3c03d00d8b9d9305de38e89d3fd7346ff8ef083492cd9216f9c79bcf

  • SSDEEP

    768:67Blpf/FAK65euBT37CPKK0SjHm0CAbLg++PJHJzIWD+dVdCYgck5sIZFmvjxHvD:67Zf/FAxTWY1++PJHJXA/OsIZ0v9Hv9V

Score
9/10

Malware Config

Signatures

  • Renames multiple (4828) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e624c0f7be4c9882871986836da4e20_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\0e624c0f7be4c9882871986836da4e20_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2456

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3906287020-2915474608-1755617787-1000\desktop.ini.tmp
    Filesize

    60KB

    MD5

    919c512616f7362798e1df3d44fc7479

    SHA1

    9edec1b6761969c250095973c893af98a4217ab9

    SHA256

    92c99687122124038c76ce6432ea23c4c2c27e5c268522f95ed7b6b5ea22fd65

    SHA512

    a7fe6e79273f7b03cea3cc89809237575b8f48d255a9a160c2b95c7cb941956a150d3acdc5a5329d105c90ffe4a5712b8d5217f6794dadc71a649e8beb941df6

  • C:\Program Files\7-Zip\7-zip.dll.tmp
    Filesize

    159KB

    MD5

    4cb7da6a89c9c56e30fa41d7c5cd2037

    SHA1

    7eb9a3c28d5ddbbbaad8c0a75d0dfea8ddfebbc5

    SHA256

    630b20f71c152d94e6cb2b6b5ea8aad6a5da3a7e9adfa32a808d83c2dd9c9f9a

    SHA512

    81a44fd214c28191db93cf3133127bf41921b1e4c3403bf37bf12c9bd8fc63b9ea5d57e953854494f13ea7ed4f89ee96ca5391c2d905b25822f49f2e956e68df

  • memory/2456-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/2456-1786-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB