Analysis

  • max time kernel
    149s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 00:34

General

  • Target

    6322952364426b74ca1c9a8adae177b0_NeikiAnalytics.exe

  • Size

    63KB

  • MD5

    6322952364426b74ca1c9a8adae177b0

  • SHA1

    f74e67d9c29ba9328a920775347dbf0c6b8e3593

  • SHA256

    d938a57e1b6ed7db312eb24f7ecb8539657f37bcbe7093ab4a4fb71d41d7473c

  • SHA512

    729d50ef72ecb2654ede8c5bc19ef82a247b4237d47df5c8d14da78de9fbe449d861022feb397b187b5d46d2af462eead18e4c2e66eef6cdc2a2be612a3657fe

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q1pkP:+nyiQSo1e

Score
9/10

Malware Config

Signatures

  • Renames multiple (5204) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6322952364426b74ca1c9a8adae177b0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\6322952364426b74ca1c9a8adae177b0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:4712
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3404,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=4532 /prefetch:8
    1⤵
      PID:4396

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-1181767204-2009306918-3718769404-1000\desktop.ini.tmp
      Filesize

      63KB

      MD5

      ca82661f96fc63b57ad656039f0190b2

      SHA1

      1563c544bd1cc3fb768a5df43e5a3d11fcde94a4

      SHA256

      8754b5d461868f6386e683fcb454c98dadad92c13d78e02bdbcc2b5ba9f776bc

      SHA512

      95784ac039a91459e0835eda1d70d95241cee1fc775ae986ad712bb6cc7502a0ec7a199519079c9bbccb577b9820cd61053b43990249363e194adaa90ffb3f0a

    • C:\Program Files\7-Zip\7-zip.chm.tmp
      Filesize

      176KB

      MD5

      93e49c1e84e1e5a4c14a913701361511

      SHA1

      560f37a19e83ab94361784740d3b5e778f33bc6c

      SHA256

      e4351ec6c6ca621bf62cc7442a1f1d66b5ba2117401b2c9c94f33ca517dcee0d

      SHA512

      5f5dae944ec76d20302ac8025a446358a5b4ac1b41f063e8fcda5c82d8d7e1b7288c8ba5bd60bdd084e1797d2e3cb14bd7be68b6986044f32bcabfea146e7abd

    • memory/4712-0-0x0000000000400000-0x000000000040B000-memory.dmp
      Filesize

      44KB

    • memory/4712-1902-0x0000000000400000-0x000000000040B000-memory.dmp
      Filesize

      44KB