Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 19:11

General

  • Target

    8d32954f507b62d7d399c0fbda73b3c0_NeikiAnalytics.exe

  • Size

    203KB

  • MD5

    8d32954f507b62d7d399c0fbda73b3c0

  • SHA1

    1b5504b43fae9369b89be3985fdaa7b78df2e50e

  • SHA256

    7e775d102a6c5f6f855d67f95d2ac9457dd955cd9d453becef6e5e506fb37a77

  • SHA512

    4137440dda0fa7148f32bbf6824ddd8dea66e0db8eb946ef4698b518d7dc6737823d35d1e999fc75e721ca62ab3cf75a34ae1163c5a99337a001f0b82f008e91

  • SSDEEP

    3072:enaym3AIuZAIuYSMjoqtMHfhfJ6W2QZwKS79:wHm3AIuZAIuDMVtM/L2ZKS79

Score
9/10

Malware Config

Signatures

  • Renames multiple (4679) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d32954f507b62d7d399c0fbda73b3c0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\8d32954f507b62d7d399c0fbda73b3c0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:3044

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1162180587-977231257-2194346871-1000\desktop.ini.tmp
    Filesize

    203KB

    MD5

    ec8d8961330b1a2e70a1c0dc01584e0a

    SHA1

    563f9788c92ef28e8a941e4d93498b0667605966

    SHA256

    433750c9fe468eadbae486b5e3b42d3b51e1b98295acdd50190672d1373a50d4

    SHA512

    838774244cc4da0a6d49b6fe991cb52dc2ff8bd2e583087adfe4e943c6fd396e12ac88310d6bd44243e2083501385de123c1d02c8ef56a8e4471200075c95de6

  • C:\Program Files\7-Zip\7-zip.dll.tmp
    Filesize

    302KB

    MD5

    a2bf3ac2178de0ca01d53a965fd13d66

    SHA1

    2b0ffc072324bd865403302eb43ef3a28f76ed3a

    SHA256

    d00ebca570f5001ab7d8c57d6259fec7bbce395eb4052df90aefd1193c29a5aa

    SHA512

    2f48a507b3d48c8df41eae44a0f11095c6b2a2ab033ef81aed25b86fbc836f72c2c1336a6c37ef12845441767dc7128e8aab9ab7544d5327c10e3671f0f8ade2

  • memory/3044-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/3044-1636-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB