Analysis

  • max time kernel
    150s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-05-2024 01:38

General

  • Target

    b1431d4bedf6b167770c3deb4118b780_NeikiAnalytics.exe

  • Size

    66KB

  • MD5

    b1431d4bedf6b167770c3deb4118b780

  • SHA1

    249ca3658bfd5b15d298a7716dbcffbeee5e0dfd

  • SHA256

    860a3d54723eac558d921e0aad5a9688558242a1b97beece0e2194b3cbf64d30

  • SHA512

    7b3e2aa9b2fd69486a0cf76ff2127e0fccf641532e3f7b7d99298384ada7385d0e611f85bf5861fdf5d27dcb573e8095225c92b4cfd1bd5470c02ccac4900c75

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8B8/8Z:+nyiQSoFkZ

Score
9/10

Malware Config

Signatures

  • Renames multiple (5036) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b1431d4bedf6b167770c3deb4118b780_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\b1431d4bedf6b167770c3deb4118b780_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:3704

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-540404634-651139247-2967210625-1000\desktop.ini.tmp
    Filesize

    66KB

    MD5

    5bab4e2736f29284eb922571481ca175

    SHA1

    cc1a4467ada1716b6fa3028c971a1145267240b5

    SHA256

    e05ce018489b60cab328589dae808c8aa5706a9735fac69c805f20887ad68934

    SHA512

    82bda69dc3194707dd717321483997b81c41fd638ce903ee1705ef064d6e29b37024b64ca951fd32deab728807fe51af555955b3a12505d915857ed7f531b9e4

  • C:\Program Files\7-Zip\7-zip.dll.tmp
    Filesize

    165KB

    MD5

    918d85d7cab4ceab7276373cd0682651

    SHA1

    819dba061f26494b80b01d0cff2fcac398c4ae6e

    SHA256

    285cac0b1e06d41d02edebadd13cfae36f9db81ed7163185fe09932563c1769a

    SHA512

    7146067965f708835b3073d7d13fb91fdbfbdfaeeb707c95da4e37494040372dfafe8a510a4a2755e99b47f8c71480178e7e28d3b35b006fcf6b46bb12044145

  • memory/3704-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB