Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 01:41

General

  • Target

    6fcdf5b5566ecd59a02ccf9aa5668e60_NeikiAnalytics.exe

  • Size

    165KB

  • MD5

    6fcdf5b5566ecd59a02ccf9aa5668e60

  • SHA1

    c1e8d803b091757c34ca561867c63cb158a18fc0

  • SHA256

    3de00c6063b520ae1ac9c91fd22734a1e3361c1006f08c18d03b32eddc69ae6d

  • SHA512

    b6474b543c412594e11bfc933cbb4836e4abbed5b7d6af557def246d699a705fa0758289053ef9d60e36738961ae4c23e455b123d5d21662776633d47b3a08ad

  • SSDEEP

    3072:KQSo1EZGtKgZGtK/PgtU1wAIuZAIuXwFwtdG:KQSo1EZGtKgZGtK/CAIuZAIuW

Score
9/10

Malware Config

Signatures

  • Renames multiple (4650) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6fcdf5b5566ecd59a02ccf9aa5668e60_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\6fcdf5b5566ecd59a02ccf9aa5668e60_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1588

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1337824034-2731376981-3755436523-1000\desktop.ini.tmp
    Filesize

    166KB

    MD5

    ad303af3c032c1ffc3d5295bb1b756d5

    SHA1

    63404fd3a32b9179f2a5ca770d1b94801385926e

    SHA256

    d7cefc013ddd75d2f1918cb06119e5cb086dd0148eab12a6bd3ce4a5cc0f9aac

    SHA512

    45f2988e42b4875f9d4e8d57fb187cc99071f7c8245a4582f52ee6533a3488bb2a3e683138ba3e3ec300a8d1111c783916fb231924015fc9c651f72bf1d99e9f

  • C:\Program Files\7-Zip\7-zip.dll.tmp
    Filesize

    264KB

    MD5

    eef35c03c06df97a1e9b4145aff63847

    SHA1

    8325bd8e41c312820b3abaa8531ce9ad95e8e6db

    SHA256

    ca9ad3b9f7eaee0819123dc5de33a0a15635d67719710bdb04feb97c8c8995ea

    SHA512

    381ac19367575ef8cd219baef3ceb14b3d9126a8f01844e868061029cbe71f542f0b22d6057b2ca373b5e1c772cf9189810102265e370d70e2a45f681902b64e

  • memory/1588-0-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/1588-804-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB