Analysis

  • max time kernel
    150s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 19:05

General

  • Target

    13fcf923e536aa8367288a21507710f0_NeikiAnalytics.exe

  • Size

    64KB

  • MD5

    13fcf923e536aa8367288a21507710f0

  • SHA1

    47d2f886769cea08a4d5cdc7dbbfac94254f9b5f

  • SHA256

    0d915dddbbecb3362fadf9a3834011096294767752021a13b0d145a8b3da5294

  • SHA512

    af6e27bcd86813f43d935527b259d0e2a52cc6189b82faf687d5ae19a7500858bd360bffd415f03cf4694d43e36ff1a05b9690bd44e311a17eb5376ee5bdc3ed

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8c9H:+nyiQSoB

Score
9/10

Malware Config

Signatures

  • Renames multiple (5131) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\13fcf923e536aa8367288a21507710f0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\13fcf923e536aa8367288a21507710f0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:4928

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-711569230-3659488422-571408806-1000\desktop.ini.tmp
    Filesize

    64KB

    MD5

    f903d3c8d6b7fca9c8879d5f8d4ea7dd

    SHA1

    5300bd378e472b1b290162c4818de47f3f5e78aa

    SHA256

    514e095055f748522272e60d85ec4627cf4c93fefad85826c4ca58891609b734

    SHA512

    d9b6180726af2f52fb54820517f540900d3e8d2b274ba96e2ec0cc6d2d4548aa15adb8e170f2a16b8040dc0f6f6ddfd9efbf342ae3e2777a4a5ea30b4c079979

  • C:\Program Files\7-Zip\7-zip.dll.tmp
    Filesize

    163KB

    MD5

    dbd54387f6267f2e411c5d87e8759938

    SHA1

    3535c6f518ec4bf66b2706775c3c245904d6e5aa

    SHA256

    3e5a5a5ab13f2af76cf3bc0501b7ce8260485a8befa9251a1aea3746e7585b85

    SHA512

    3906580c89bd7cf88eaecc14aca1f198cb0ab700e25c001f0f5282f72926356e85698d3a2d10fcf253fc33032d5dc3ba8a29d3e54f6eb838332a1f5fe81ef187

  • memory/4928-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/4928-1828-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB