Analysis

  • max time kernel
    150s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-05-2024 06:18

General

  • Target

    7342fd9fb34dfad1d7e616fd42140060_NeikiAnalytics.exe

  • Size

    103KB

  • MD5

    7342fd9fb34dfad1d7e616fd42140060

  • SHA1

    0247c7d85c43e9cd6fb05c069f25b59479f1f4b8

  • SHA256

    f6c7db0dfbdd98c284e3c5f4eadc2475939f0274f0c52e554bae4d960b6ccdd2

  • SHA512

    6914d4e93e0b1e63924f8d7b1fe2b87647d1a6e6a04cc50e94112ab857caeb33938562cad0f69348338b95cf16828be9d2befb4edb9072702f5c65b3b38624e9

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q89TWn1++PJHJXA/OsIZfzc3/Q8/:+nyiQSo+QSos

Score
9/10

Malware Config

Signatures

  • Renames multiple (5079) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7342fd9fb34dfad1d7e616fd42140060_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\7342fd9fb34dfad1d7e616fd42140060_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2264

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2804150937-2146708401-419095071-1000\desktop.ini.tmp
    Filesize

    104KB

    MD5

    e762186fbe5f9419165fa6a34835fe9b

    SHA1

    ed52e07afc637af637f6eb458336656e962aca21

    SHA256

    27b79e31cb9d641cf12d55b4ed0a2308bdd59dc124ea8bce96b9fae0139288a4

    SHA512

    010bbe21890d5a5238e467cbd64a1426f2f1f7ad736310a25d5532d12ad7a5f1b93f8718a11e608edfb4bf7aa115b267dc3d60aa1c6a045c90c5f9cb6d35c38b

  • C:\Program Files\7-Zip\7-zip.dll.tmp
    Filesize

    202KB

    MD5

    7c0f5e227396221748823d054ab92d97

    SHA1

    760db561bdc07cac07b7cd307558618b0652d676

    SHA256

    2a2dd20396bda70b75ef085cce9589893d640808b565c365da9a3025834c9174

    SHA512

    424117386ff7b816dff82136d83357a1099cd4bd674d3b3ce036099affa79150dcd6c8015941ef340c6d4e904c49932a19ef9da34c7d215846be2bae24afa925

  • memory/2264-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/2264-1848-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB