Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 21:01

General

  • Target

    3a7568feb2aaf11f12f33269aa8a33a0_NeikiAnalytics.exe

  • Size

    76KB

  • MD5

    3a7568feb2aaf11f12f33269aa8a33a0

  • SHA1

    118a06ff8161325cc0a9895b70aed1098f1b1e55

  • SHA256

    2452a0a7a2911d18f3114b50608c96e36be0a7e361289153b6e3d80faab228e8

  • SHA512

    8a181d3f929832536acf8bd9a3ec3496d9995bf1ade208149cbb6f39dd22fdd0e99c48b54b6b817fb6bc858771fac07ae63301c7959c2cd0dbb8d7b205307ca2

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8xJJMJJP4N:+nyiQSoF4N

Score
9/10

Malware Config

Signatures

  • Renames multiple (4824) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a7568feb2aaf11f12f33269aa8a33a0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\3a7568feb2aaf11f12f33269aa8a33a0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:848

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3558294865-3673844354-2255444939-1000\desktop.ini.tmp
    Filesize

    76KB

    MD5

    7de86d05f7fa4f05f381b8da5b92c92c

    SHA1

    8e9b19e56a4c309b19bd78f2b5c68c73fe5db0ce

    SHA256

    ec0d6ed17a13e4be992cf3e4715ef1ec9a5d621915c5c42f5ff65301a2437883

    SHA512

    a119a2a7bfad5964cd8f1c78c6d7003e20bbb31e35783d4debcff0c7f4f76daeb16502e14d47499ef4c8b2f36c753dab4a2c1183e0295a6dc7aafe236103d5c4

  • C:\Program Files\7-Zip\7-zip.dll.tmp
    Filesize

    175KB

    MD5

    c61c92071e6be8a0de93484c8c925f66

    SHA1

    ef5ea1bd0e08d8d5894250419b9dfefdb7518c34

    SHA256

    f0c421d3de1feff55148329bcc14ca550d9ac44fd9aed977091166f6d8dbad9c

    SHA512

    676abcb99da7c9fa58a8b7cee019b5f0f4f2b310326149a7a6f4d838be0858c6960815a8fb72605b44b28f3f77d6e10eac27d46b93fb3290b3ae50b4d2f785c1

  • memory/848-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/848-1774-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB