Analysis

  • max time kernel
    150s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-05-2024 00:30

General

  • Target

    36d44c4fcbe4113ce4f5037bbb444400_NeikiAnalytics.exe

  • Size

    74KB

  • MD5

    36d44c4fcbe4113ce4f5037bbb444400

  • SHA1

    0f88a4ecb0da163fb9f3d029bbbd54ab7da8097b

  • SHA256

    d35e4e7e9b4842c9c62c2642d3afeb95f656f0a2b048930de95fefaf957eabd0

  • SHA512

    d254029af7d8eafc3101a2a5989d80ccd75f4fc8235348b13c2fff2e88b7d4e9349bda8b7b4b6eeb3541ac4009f47b67a6fcce6fbef0a8c80de1d43779fbd0c4

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8yi0:+nyiQSoF

Score
9/10

Malware Config

Signatures

  • Renames multiple (5108) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\36d44c4fcbe4113ce4f5037bbb444400_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\36d44c4fcbe4113ce4f5037bbb444400_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:3196

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-540404634-651139247-2967210625-1000\desktop.ini.tmp
    Filesize

    75KB

    MD5

    840df6a42889e194eaa6c06e48dfed6e

    SHA1

    04f1399541cdbe2446075fd1f2b0b13b6a379e8f

    SHA256

    c9436853ef88c143fc536a58ad7640378bd98d6ad933481f9e2a77d714ed397f

    SHA512

    07c129049a8cdf223e8a89bd02e6f654556131559efe81a50c3553b0b44b251e8dd1e83eb527b01aa015650079b3deb1d4ae3a11737b050d2c09bbb1815adc1f

  • C:\Program Files\7-Zip\7-zip.dll.tmp
    Filesize

    174KB

    MD5

    2797f02456764e5c5c4ea3d5efa236ac

    SHA1

    1ec2dc95393b468180b75989be952c37a31b1f9d

    SHA256

    740e4b654c00110b415c525cb19b068b127f2044eac1dfb38a3123344ceeea4d

    SHA512

    5f75383835ca1edba1cd8d8064015840b549614e3f2427daa7231a9546998ad4758a9219fe830bfd67f1105c41ed4c3ca73b212fc8a74d25dfa95c58a29aec8c

  • memory/3196-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/3196-1892-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB