Analysis

  • max time kernel
    150s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 15:33

General

  • Target

    ac9bf9f0018ec833aaae8269bcf33a10_NeikiAnalytics.exe

  • Size

    62KB

  • MD5

    ac9bf9f0018ec833aaae8269bcf33a10

  • SHA1

    382c07667371bc27791793ecbe208c0f59a9c29a

  • SHA256

    b81f3377b6a139ac064f7316451545d08ad580f3bf812ce7b0f83263b10e372b

  • SHA512

    0018cc8c584110a76cec2ec3e4a28eec375e54b43b0c046927c8fdc1a705ab99cd5cb9661830ab36f93a1a3771ce399f04235efeb6c982b266133a861a7f92c5

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q83:+nyiQSog

Score
9/10

Malware Config

Signatures

  • Renames multiple (5040) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ac9bf9f0018ec833aaae8269bcf33a10_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\ac9bf9f0018ec833aaae8269bcf33a10_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:3828

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-711569230-3659488422-571408806-1000\desktop.ini.tmp
    Filesize

    62KB

    MD5

    27de77e44751d939199aa9d9f015a63a

    SHA1

    987a7b76b263a62af8a673e5900e7236bd7ff425

    SHA256

    96986e7337e70cdc346b4752d1b46aacb90d4417ff01be7c48d96d198a8814c3

    SHA512

    8134c480db13ba73d1309949f81b745312c6a865626e6505ba20626d2fb0b8aaaf60bdeb6be35372bdfcf98561458be0743fe7c6c8af171f600a0fb4e914bf82

  • C:\Program Files\7-Zip\7-zip.dll.tmp
    Filesize

    161KB

    MD5

    fbad470c7e5338f74bfecd1b2cc535ad

    SHA1

    2999ffe0a8df98678f93d7c8ee19ec509f96bf66

    SHA256

    832d37ef6b59b195dcaee33e6fb95fc43d4c58de66ba18211033df39c9de688a

    SHA512

    376aa7db7382dbe19a3dcf27c8fd9f2ac61739aee3c6c3d1e0d87c5090b54c83a09f52e8c18787f0be0072698b721b71772d9ef5c891e2f47c5b68777756dd0d

  • memory/3828-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/3828-1862-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB