Analysis

  • max time kernel
    149s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 20:31

General

  • Target

    347cb6099f2c8457a1a8dff4f3bc3960_NeikiAnalytics.exe

  • Size

    52KB

  • MD5

    347cb6099f2c8457a1a8dff4f3bc3960

  • SHA1

    be4df16b13f796e8232add826144ee1d925951a6

  • SHA256

    6fe9f91eb021d319ed3bd320fe6409cc60281af87b7b797a9d01defa207cabe5

  • SHA512

    0601e72fb0396c8c0bd7edfaf7727a699c285f59e2ac2164cfcb950a774f0ce56e3aa85af45f05d951b3d486474b46a2670a1af2c07527d5fa725a5a87ce66f5

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFFr:CTWn1++PJHJXA/OsIZfzc3/Q8yiemx

Score
9/10

Malware Config

Signatures

  • Renames multiple (5199) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\347cb6099f2c8457a1a8dff4f3bc3960_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\347cb6099f2c8457a1a8dff4f3bc3960_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1432
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4288,i,11746347647270949551,7786733067759450703,262144 --variations-seed-version --mojo-platform-channel-handle=4160 /prefetch:8
    1⤵
      PID:4008

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-1181767204-2009306918-3718769404-1000\desktop.ini.tmp
      Filesize

      52KB

      MD5

      56b4c89fc66b3dd0b901f75d4d77771f

      SHA1

      ef0e638f9772538d1f88ad115a0b6246fa43682d

      SHA256

      0548e4b282f07a1f5ca12b593bebbce84722bb94913e9c9e99d4b99243ae2bba

      SHA512

      5e30c03f1f64702e1337e9bf4b2ed0586f711bada59bc41c1b62bfddd1f9447be061baaf49069d4d975749b36bff92ee5b83f684f9f77c130e1f5951686ebf55

    • C:\Program Files\7-Zip\7-zip.chm.tmp
      Filesize

      165KB

      MD5

      f4e69ff4279f773c8ad3bcc1925f161a

      SHA1

      e07f08cf25665bfde9f7ddc8aa4aa5afa91fc074

      SHA256

      13c7e8ea0076d6480076ae10bf895f46d0922eb724b6839945aea149ad029ddb

      SHA512

      21fa615088cde809b53929c5426f8cacc69e80b98e747b26798075d3b01e28c45236710d2a60c4cd1816f318ae379dc01c0f88782fe28da9b29b45a4ad220ce7

    • memory/1432-0-0x0000000000400000-0x000000000040A000-memory.dmp
      Filesize

      40KB

    • memory/1432-1096-0x0000000000400000-0x000000000040A000-memory.dmp
      Filesize

      40KB