Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 03:01

General

  • Target

    7e04b84da398f973a13bbd9af13cdca0_NeikiAnalytics.exe

  • Size

    71KB

  • MD5

    7e04b84da398f973a13bbd9af13cdca0

  • SHA1

    1506a1a789bab08652b787dac9dfa0df3ebdd7ab

  • SHA256

    d670a53ff7b6e7a2ab02d7298f9057f768c630a657c86aefe4479026518dd0a1

  • SHA512

    e800e85d173a2c9a3b1693d77f06cbfdb4f259ffebbee0de74f74b4643b345383afdb563183a8f831e64f88fba732f940785a03cf1c1e78514a45765731a0077

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8xJJMJJo:+nyiQSom

Score
9/10

Malware Config

Signatures

  • Renames multiple (5188) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7e04b84da398f973a13bbd9af13cdca0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\7e04b84da398f973a13bbd9af13cdca0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1284

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2804150937-2146708401-419095071-1000\desktop.ini.tmp
    Filesize

    72KB

    MD5

    b117ee89c3dd6cd4a056b924d2a36a1b

    SHA1

    74031e75d7d5ae461f6bab3293f4c3ed919c7267

    SHA256

    97df35e6d48e1e7afce0875ea3ce3056250363a28eb339a41e21a435aed9365a

    SHA512

    16d58e50c61e6098b2e90b9ce89d3738b9acb1e11ad5deb1c2d520b921e135fe412aa059ff96e4a2580ee9c197b749d06c5660c855deb6d985956812d703bad0

  • C:\Program Files\7-Zip\7-zip.dll.exe
    Filesize

    170KB

    MD5

    17eaa089d386fa34a14de4f26b34a058

    SHA1

    1729f8453156218d7b42f6b546c3ff20133ecf29

    SHA256

    8a683578852020b5a0a65f2df612db618d624eb8602175df820d8aeb2279e439

    SHA512

    8c9ed244acbae1195f21d2ca5e25c022177f8d2204cf9ea31824cce25cf81592713b5042ee4dd785044cf44cb9cd21eb6d64f65b96a334bb099f904e64fe9aee

  • memory/1284-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/1284-1886-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB