Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 21:06

General

  • Target

    3bbd604cbb66f5d275a67922de528db0_NeikiAnalytics.exe

  • Size

    110KB

  • MD5

    3bbd604cbb66f5d275a67922de528db0

  • SHA1

    f090c95a1d06573ed5f8981a11a1283e83337360

  • SHA256

    443f6403c50c6db947ccca88375b4486078749cabda932d452d267a8487bec98

  • SHA512

    798feaae98932c0d75ab1790f3c609857fd37da7c83ce3cfdba24c1a3b689a6a10e79eb3d70de9511f080cd875bbd0452ae0bc326902b67e0940a0aa757ed0de

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hfS/M:hfAIuZAIuYSMjoqtMHfhfqnM

Score
9/10

Malware Config

Signatures

  • Renames multiple (4837) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3bbd604cbb66f5d275a67922de528db0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\3bbd604cbb66f5d275a67922de528db0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:4116

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4124900551-4068476067-3491212533-1000\desktop.ini.tmp
    Filesize

    110KB

    MD5

    2ff96a98d8cf8544a38bf482736621ed

    SHA1

    b25491b5083fb4ad8617baa1411d7e73f0954e3b

    SHA256

    db59894c29ee00657399547cfdd73fd8aa85183b128750ed5fc714406d3c716a

    SHA512

    d35df53e371355b5031bfe5875b4822caa88cbb83cc8fbc6c59ea5f8969fe6b889f746c71f7fd9556b8d8e68c92738a757a67a0bf1390d75ccd7ac395f12a2ca

  • C:\Program Files\7-Zip\7-zip.dll.exe
    Filesize

    209KB

    MD5

    3922bf0ecb6d68dae9e88178012a0d84

    SHA1

    1ee06c4a4363d661215501ab6958ca234d102b55

    SHA256

    16abc0d53c7b2f73093e9fe5f915df93f318bbf2a252d4b52f67c635c66139c9

    SHA512

    0ae715ea7c8cd0ef7aabfc3b6ba72aa63a73c2b085bd6d889b194484bddb40a4652ffee867edc9f58d01e7b3cbcf1e62c108db9edf55d255030db37209d502fa

  • memory/4116-0-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/4116-958-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB