Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 19:09

General

  • Target

    1e50155393d82c96bce75edf846b5010_NeikiAnalytics.exe

  • Size

    61KB

  • MD5

    1e50155393d82c96bce75edf846b5010

  • SHA1

    55e164c517256fa487813dfb420128eb063ec2d3

  • SHA256

    af14488d2037efb2dcbb69bbdea90e08c9d23bdb84e60023794a08b612e70b72

  • SHA512

    e1520924e25f496d040b46a1f8bace6670c2dace49b581dc16ba374d7d560f673cd3e28780052439f9df8be8eeb4e580afd8f4a4b6e74473142c06e83da1e1e4

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZ1nKs6nKsD:+nyikUb

Score
9/10

Malware Config

Signatures

  • Renames multiple (5239) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1e50155393d82c96bce75edf846b5010_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\1e50155393d82c96bce75edf846b5010_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2700

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3558294865-3673844354-2255444939-1000\desktop.ini.tmp
    Filesize

    61KB

    MD5

    7a9b5c986054f67a61f06b12ef4fc72e

    SHA1

    91948c1d1f1f76196a353217c5586689847ca7ba

    SHA256

    20fc7a19ee7c891a8aac4fa35d8bc87d001a15f2218483b0ae2425a3682605b5

    SHA512

    68d45e4b3d84b6fdabf0c58d737a2549b818236e741e39ef92494620ebd6168eb08e4cabe8628ca49ebb7f00711371f821790a4d0a3e58ffec4a239c87021db2

  • C:\Program Files\7-Zip\7-zip.dll.tmp
    Filesize

    160KB

    MD5

    a4f56deffda4cc81a0aab7126065fdef

    SHA1

    ad24dd876ffdad772cea4b1c4f58aa3b90d3a84f

    SHA256

    f8d60481f90fdc1b1adcd72408e0c313ddcbf5918aaeef2e4a6be5f0b6aefa0e

    SHA512

    287088323af856c57cc35f05c7cfc1bac66f82ee3095c3eb4a2ad34ad9d833be0c4d6177ccd34740e7b4762a5685a672d1c2f37aacd5f240ca97fffa7ca4a7e8

  • memory/2700-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/2700-1953-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB