Analysis

  • max time kernel
    149s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 01:40

General

  • Target

    6f89d151140c69ef3c3b2fc2a12c4be0_NeikiAnalytics.exe

  • Size

    101KB

  • MD5

    6f89d151140c69ef3c3b2fc2a12c4be0

  • SHA1

    aadba4131f312d482fcb6c6666e35b00274c012e

  • SHA256

    17d9298ffa8f60105810df7a4d07d40a1359e4d52ad57f525873d5ab55bed48f

  • SHA512

    5656cd1b8884c887029d6efb1577878ff7c22d398a805145439ad9b467e82c4fad2e78b8d0618a6f92822cf5836d734dbaeb159db2186fdf25aa354b66fda22c

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hf5SP:hfAIuZAIuYSMjoqtMHfhf5SskD

Score
9/10

Malware Config

Signatures

  • Renames multiple (4839) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f89d151140c69ef3c3b2fc2a12c4be0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\6f89d151140c69ef3c3b2fc2a12c4be0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:884

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1337824034-2731376981-3755436523-1000\desktop.ini.tmp
    Filesize

    101KB

    MD5

    45029d6e6a99724ea9b8b97997186d27

    SHA1

    38c5dabd65576a98fe824325e863ccfecb07f14f

    SHA256

    1fbbc0aa4b19d0895a1fc1580d8530494bb3441f62c960ad26a9b2e31d81e3ac

    SHA512

    8ff63148a8f58a3d9dd609735fbeee56a1c090db00ca453308a1867ca80e94d120ec3115f1423cdd450aaac96c23dcf286b17a8a5743114922a3b7ed47caa395

  • C:\Program Files\7-Zip\7-zip.dll.tmp
    Filesize

    200KB

    MD5

    760721e5cfa5427af432bb59f4762d76

    SHA1

    c467327ac56992c5b1d08b253c354e888c3863e6

    SHA256

    c9b20d29002f5cde5908ddc58cb0eaffc223711165c676e37034039b02886c51

    SHA512

    208af79c6d5e9ec22f3424225d2cb926f69f9af223e558186c0b5549a5987c5cd3773ecf05a008fc6618392427f7ba76898a860bfb12d313423f4900bc75853d

  • memory/884-0-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/884-910-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB