Analysis

  • max time kernel
    150s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 02:03

General

  • Target

    73cbc996bd7fca8498c69f157e688ec0_NeikiAnalytics.exe

  • Size

    201KB

  • MD5

    73cbc996bd7fca8498c69f157e688ec0

  • SHA1

    e3294f098a0853a03f550daffc0e0ed672eb9e69

  • SHA256

    0b82a5adc6ab559abce748596e2272870f20ba4b508af89b670c3aec74be0233

  • SHA512

    b1d45a6bae3ddb72971246f50200cdeaa3e5175f7580265e6c87cc1ffb545947ac16c9863d79a7d0c996e00e0c02954b6f6b0a587704071bcb6f64905afbd375

  • SSDEEP

    3072:KQSo1EZGtKgZGtK/PgtU1wAIuZAIuXwFwtdU9N9xaiFk:KQSo1EZGtKgZGtK/CAIuZAIukT2im

Score
9/10

Malware Config

Signatures

  • Renames multiple (4445) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\73cbc996bd7fca8498c69f157e688ec0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\73cbc996bd7fca8498c69f157e688ec0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1956

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-711569230-3659488422-571408806-1000\desktop.ini.tmp
    Filesize

    202KB

    MD5

    61c36a1c59dcbdae83d1795f45ee0caa

    SHA1

    fe97fa3ebb33a5c14b4ac21a1ac59ef757a071dc

    SHA256

    c2784c3d644ecc0336c0d0707b63a475722e85fbfbcb1faf1de7083af291bb31

    SHA512

    528a3a82b890390cc6c11772ba0f1a7235a74a1b4f64d029ea08003f08a178de9bdb2c72fdfec9acd3ca78ba59045d652f8d22eb741214792e16e837f09bf432

  • C:\Program Files\7-Zip\7-zip.dll.tmp
    Filesize

    300KB

    MD5

    2f8e1569e5022f4eb5a487b6b47c3ce7

    SHA1

    f1236a1af3d224aadfb499117d23fbd4064d8ade

    SHA256

    8af39a63b6be56ea4d1858461364b0a04a9fea62241fcccb04f0ae57f6a828b6

    SHA512

    8abe273beec2f0f23c6fcb54994aaa55c944fc0114378967a372704227bbe8e3b9e0a199cd6ab2f2671f4dfcb3ed2dbad858a29cf5d3c910f56306e96f177acd

  • memory/1956-0-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/1956-794-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB