Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 04:14

General

  • Target

    a43f475bb4e2124ef957503860f581c0_NeikiAnalytics.exe

  • Size

    109KB

  • MD5

    a43f475bb4e2124ef957503860f581c0

  • SHA1

    0b92bbb4bb6ab49a2d565d20003dff421cf178eb

  • SHA256

    17c9432aa8362cf18c800ab7f3dfe6b9ea7c40d8ea954f8cd9c850e26c386b9a

  • SHA512

    bf6f51ceaeb1a253308d9524eb85fd5fdbf2acc39c454426d7de6f246d0c5435e327dacaab7d1a4f3a12f389d484454c9f1ad158bc229df893eaa473c4c6f7f5

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hf5S8:hfAIuZAIuYSMjoqtMHfhf5SskQ

Score
9/10

Malware Config

Signatures

  • Renames multiple (5021) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a43f475bb4e2124ef957503860f581c0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\a43f475bb4e2124ef957503860f581c0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2868

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1337824034-2731376981-3755436523-1000\desktop.ini.tmp
    Filesize

    110KB

    MD5

    48bf8f6713d6341d9f31153c25bf76c8

    SHA1

    85bf05c53b20b9ad40a5393e1b5e710d907a3af8

    SHA256

    22ff18dd273f9be0e29b2eb8919d7c37336a0eb58f65ac28ac27b6fe9bdd17f2

    SHA512

    a884815f7feb866adf5b7414f2366d4e855661d9c1aefb8a895d0553ced4e4f17864595504564d4f4bda90795d09701dc168133c093700cb3b5e6d2b7c5df71e

  • C:\Program Files\7-Zip\7-zip.dll.tmp
    Filesize

    208KB

    MD5

    03aa32123c254a803912f3c681f05b9f

    SHA1

    7d7c3c5831fee2e7ec9099c2ac348b45ea5182fe

    SHA256

    4f8f26add2c4df7716fb2a476a1d17be98a5f8b74bb10b75fd2f98a1fa005da8

    SHA512

    75e49fc14ae1075714f6c386ed6bcc944d2651e06fb229401c26a62d1f691b1c7a7327963d5c02e3c7642c92b946899e92626656fcec96e0fea15c9068c93e97

  • memory/2868-0-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2868-1034-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB