Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 01:38

General

  • Target

    6f22e00d6112070c3f18dc872e33af30_NeikiAnalytics.exe

  • Size

    102KB

  • MD5

    6f22e00d6112070c3f18dc872e33af30

  • SHA1

    5087c24bfe1a60dd4e9396dafbdcdcd0fe276a66

  • SHA256

    d04e3ffbb999069b45a44ed7c2141998ba4d04473fe427f399ee01eb6b97eb4f

  • SHA512

    24233190ddb260578885f857a2018b72289ead0d473a8abe72d4e3df40c22a82ff9ce64dae5d6466e26f0372241d262a3fa07c89a8fc6ed43d8cc597b6e8e8bd

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hf2bv:hfAIuZAIuYSMjoqtMHfhf2bv

Score
9/10

Malware Config

Signatures

  • Renames multiple (5014) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f22e00d6112070c3f18dc872e33af30_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\6f22e00d6112070c3f18dc872e33af30_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:3840

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2804150937-2146708401-419095071-1000\desktop.ini.tmp
    Filesize

    103KB

    MD5

    143a7b3a69594d0c35a75c9487eb47c3

    SHA1

    4a4428b5f9990098d3f9563bc79113667a401fbe

    SHA256

    61853913cf46118b5f5988870b7eaa4ede2bf47053e4ba11fcec10fe8aa3f6b1

    SHA512

    38bc62b1a4c5c8406bdc4b7a7f89bda2efdc8960600be1f863e2d9c5df66f83d1c55ef767b800bfd6f51a23812b57d76472cc31d6f8ae0fb78616b55789e3103

  • C:\Program Files\7-Zip\7-zip.dll.tmp
    Filesize

    201KB

    MD5

    6c45a9ce565f8e5d22707a9b4520cc90

    SHA1

    20be85b6c480588d1daa6acb0a86d44908991e0f

    SHA256

    85415113b7181eb9d35884dd4b0c146e7a1cb45dadc91d8dd40e7d47cd33f55f

    SHA512

    6a8c3b7d31406a703a8cf046467ec664a67adc2f193e7f374c9dcec1f7758ac36c6634888ffa91accdd23f6dbdc5f9c4e42ca9b7bec06a4144b196de779e80d8

  • memory/3840-0-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/3840-1090-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB