Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 14:44

General

  • Target

    4908cc86f2e5897f7d07677e85718980_NeikiAnalytics.exe

  • Size

    74KB

  • MD5

    4908cc86f2e5897f7d07677e85718980

  • SHA1

    1317961d4582479135f275a715de4027881b7f3d

  • SHA256

    adb1ca3c3ea9c5b398b5e98c2496cfd80a9ebb44295a48bc5edfed10e0d43693

  • SHA512

    fa60e2fe04ed70205bd49e2cc4c6b26a9b157a0f3ee212cb21b69267141c2b686b511485b6bf9ef168b58d0b2972f11c8c777c0f150eb50c1bdb267d0d94c112

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8yiY:+nyiQSoJ

Score
9/10

Malware Config

Signatures

  • Renames multiple (5035) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4908cc86f2e5897f7d07677e85718980_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\4908cc86f2e5897f7d07677e85718980_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2656

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4018855536-2201274732-320770143-1000\desktop.ini.tmp

    Filesize

    75KB

    MD5

    571c35ea3708c9a349dbddb68b11625d

    SHA1

    9b5765a46f3ef13dc7d57febf8e0041309e69f70

    SHA256

    eeb1f2f87397a9437ce9724454ef00909050d9ec55e86f72ce90a48d5ec6cd12

    SHA512

    f2014e4eca4316d50ebeae8df51ac4b3c1b73b4140968b8c0350be352255320cd903ef80d56d7e11ebda22ac69156a14d53b95a39cc019c235bd8ae8ac2ee189

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    173KB

    MD5

    dd75c44b556cc42084f5acdd0d251c3b

    SHA1

    0abc60f030811b1bef7980800e59a018f6e0c932

    SHA256

    38261c39d3771fdfca46235ab1f175b6d8eb66df116a1df6aee64dece7dc1684

    SHA512

    55731f4f316a8e276caa407c6aec968430e916d11a77e100a0eb560c6a4b00cd5caa3abc2345e85b0b6b55e63489f4c1fd8c9715712be70aca98944978524d9d

  • memory/2656-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2656-1844-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB