Analysis

  • max time kernel
    150s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 02:39

General

  • Target

    79d848342f32b0eda759da7fa64dcbd0_NeikiAnalytics.exe

  • Size

    80KB

  • MD5

    79d848342f32b0eda759da7fa64dcbd0

  • SHA1

    716bacf6ce7494e276afc800e16606a686370208

  • SHA256

    bd372a946d1d5578abc82c5f89befd32f71c397cf1b1740b2a84c10840a4de89

  • SHA512

    58aa10bd60b71a11dc85fee0145e6606707af2b3b202a91dab3d9dc05cb83eda52e577ea4605f66a5c310077e32b921ad82136a3c135b8e146b8cf9625533b18

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZfzc3/QbU/A:+nyiQSobU/A

Score
9/10

Malware Config

Signatures

  • Renames multiple (4871) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\79d848342f32b0eda759da7fa64dcbd0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\79d848342f32b0eda759da7fa64dcbd0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:4168
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3804,i,1999448010053300448,1112699187621658374,262144 --variations-seed-version --mojo-platform-channel-handle=4004 /prefetch:8
    1⤵
      PID:4812

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-1181767204-2009306918-3718769404-1000\desktop.ini.tmp
      Filesize

      80KB

      MD5

      144c1d72ca6f0f5dc94a8aab28814de9

      SHA1

      4b8a9fb7d1505bff8007f7e17c288a410e4304a9

      SHA256

      cf9d15e4169030bf31e99dc942e3647d1445b5b2dee8b14d53309c58688517a5

      SHA512

      6ef637c950240a2eefe6c78599f1d570fe33fbb17a1a9257e2e0f14c2be56b0d64916c67c7cd3da1f96eb53aebc639f9191d9422453e58594b45fe02c757e067

    • C:\Program Files\7-Zip\7-zip.chm.tmp
      Filesize

      192KB

      MD5

      32ea27c87b8011cb757074a42ac1efe9

      SHA1

      6868f46a1c1c954915495ee3d11c562d81a07937

      SHA256

      bebe0fac51dacc09e3b8659c52c5123f7267663733d821100e66aa3027251214

      SHA512

      4a31533d39e6a96b394d93786d40430076ad07e7fc19d5ca2e0054ffa0f9ea2f4ce201ebf6ff7b2e808c72cec515d1accf17438f894be4c1ea7e060dedf76da6

    • memory/4168-0-0x0000000000400000-0x000000000040B000-memory.dmp
      Filesize

      44KB

    • memory/4168-1808-0x0000000000400000-0x000000000040B000-memory.dmp
      Filesize

      44KB