Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-05-2024 23:58

General

  • Target

    3a7908a27f70ac1d6a3503a024d648e0_NeikiAnalytics.exe

  • Size

    53KB

  • MD5

    3a7908a27f70ac1d6a3503a024d648e0

  • SHA1

    f633df7a4729a3871f94c0b52b4c6254346e981a

  • SHA256

    78e2b9d6cb2d87305409bacaf361df6d25108331d8e75a952cd9c3eca67a4768

  • SHA512

    d8ac942b7d954cfad260eb024a3508cbc6e84b3862169d9cd6cd66ef396c981a0052371737db0f695d60081e8ccc7ac1a77b2ef87da83732f0e066f8644deebd

  • SSDEEP

    1536:CTWn1++PJHJXA/OsIZfzc3/Q8yiuaa1aaZ:KQSo1aa1aaZ

Score
9/10

Malware Config

Signatures

  • Renames multiple (5210) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a7908a27f70ac1d6a3503a024d648e0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\3a7908a27f70ac1d6a3503a024d648e0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1628

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4124900551-4068476067-3491212533-1000\desktop.ini.tmp
    Filesize

    54KB

    MD5

    e58352b5e61498a5d4845958c15943e4

    SHA1

    d00cc42d3db8838c17dec2100b65434ca1060a4e

    SHA256

    6089391ebdeb06c76ab37721fd0e9c69b0fabe2af790cc375a20241ad6e97a92

    SHA512

    687cb03385c499e93ead101720724bb0ef8c99ef33196ea0e89de02ae7142cf6f1765743a0c13ad922caefe53ffc7f7dfc45b0c116439527bd1ed67b39ee6773

  • C:\Program Files\7-Zip\7-zip.dll.tmp
    Filesize

    152KB

    MD5

    02cea2e9fee1d8bc7c6b604d55f86dec

    SHA1

    65a6035900bbf0f8a7ee370f6bcc27e4580c6d40

    SHA256

    a056a6b96f224da91c7ee1af17397b785862541a557d4b9c6a4238aa5d37b09d

    SHA512

    d729903ad4d58e18a0e19698dd8badf1df5e89aa749c355755dd09db594995f931bcf89dce58a4973eb81cff2f9894af811be29479fc250605ad7ff34a97fb6e

  • memory/1628-0-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/1628-1154-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB