Analysis

  • max time kernel
    149s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 01:48

General

  • Target

    7126c9397a8722cc200418bf96388720_NeikiAnalytics.exe

  • Size

    57KB

  • MD5

    7126c9397a8722cc200418bf96388720

  • SHA1

    ca9ffd03d75f05d14c72aa0b6204e977620f3e08

  • SHA256

    31b9403b9e4211d3c67b00deaea4248888ffd38cde760101b711ebf708bed219

  • SHA512

    bd9767a79e1ce76e698a1615af521c722c163dd496ddbc78800c6619f3300da3d72d46985c20008e6fad3a4d02d4a56674356c6d580c616d5bb9e957ba5184ac

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2bTgT7v2r:CTWn1++PJHJXA/OsIZfzc3/QbU/+

Score
9/10

Malware Config

Signatures

  • Renames multiple (4846) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7126c9397a8722cc200418bf96388720_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\7126c9397a8722cc200418bf96388720_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2028

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3906287020-2915474608-1755617787-1000\desktop.ini.tmp
    Filesize

    57KB

    MD5

    78ffc68731823abfbddb3f3725286e6d

    SHA1

    c2f9c9badcee96e161e77ccc589b3a38332f506b

    SHA256

    472c3258f963d7fec509a2b3f0ccb175b3f3317187acd301e19566d384b1fe70

    SHA512

    c3514c50b4fbb4c5cb2876a6db242d8558bfe3481486e84147e6c3de3042dd3bb267366f049189d5e0c3947bf5293f692aefb767efcf08d5dfb6d34180a4c8dd

  • C:\Program Files\7-Zip\7-zip.dll.tmp
    Filesize

    156KB

    MD5

    122c0549ef61be39ae87df2df500a001

    SHA1

    9745aade8c83fc7ec27b9e3071f8c4564ed03970

    SHA256

    1b200d9218c3640d579cccf73b37137508c35d424b1ab0f2f7fbf4fcbbbe3ca4

    SHA512

    5c390f4364579a426bee94146367357ea5fb15a8b81797157d6de14db234cf632011330dca0e53e7eb609d8af8bc020d93acc06ed2e25da88e01bd876df20a15

  • memory/2028-0-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2028-1018-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB