Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 21:07

General

  • Target

    3bd22087a4795cdf0ea1fe669cba14f0_NeikiAnalytics.exe

  • Size

    55KB

  • MD5

    3bd22087a4795cdf0ea1fe669cba14f0

  • SHA1

    202dfd22d8f581d071f5505ee3c3ba060f64927c

  • SHA256

    82b40788af745ddf5da5a423cd00ea603ea558a49f1f66b460cf18681fd99664

  • SHA512

    4a58048f6a508238d6259e732eda1817e6e6f852160e413f2fff03b27f886fa71382f2cdae96c9385dbaf5440e258f8ca6dfcf9f29922333ef710b0e398847aa

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFFP:CTWn1++PJHJXA/OsIZfzc3/Q8yiL

Score
9/10

Malware Config

Signatures

  • Renames multiple (5230) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3bd22087a4795cdf0ea1fe669cba14f0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\3bd22087a4795cdf0ea1fe669cba14f0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:4596

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2539840389-1261165778-1087677076-1000\desktop.ini.tmp
    Filesize

    56KB

    MD5

    5cb6fa69389f23bb61fb4fe395f0464a

    SHA1

    e26c61ddac5205bce7c677674ef5b244052b4a86

    SHA256

    cc09eaba5904797e40d90c7d609ec3299b601c742e4641945ef1226014184e9e

    SHA512

    8e7cd4dd7b1563d72e1018c60f662d9adc6e08164cd1331a72222c61d09f11ac6d124a5cf99c505eec40950066dbc66b7b04d60a417ccea2e0b551ab4d8c95f6

  • C:\Program Files\7-Zip\7-zip.dll.tmp
    Filesize

    154KB

    MD5

    9beaa3a9d2a3592314f8f0a973e207fd

    SHA1

    f38fc5e5b59c5a6496222d9926c9a8609c6dba3d

    SHA256

    430e3fdf904879f29e2d98428f99d32028f40f39cab7a64ad9e3b52b3ca60588

    SHA512

    f7a3e7b60789a7629860bc404da6dce9b4dc6859a0e38c5fc1ccc7684e2425e9ee20af3807ca6ff3997bc225c52369746b2f77a014c8768dba8d73fee12e64d5

  • memory/4596-0-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/4596-1154-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB