Analysis

  • max time kernel
    149s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-05-2024 12:23

General

  • Target

    bfaac262e97043aad2be90948aea5ba0_NeikiAnalytics.exe

  • Size

    349KB

  • MD5

    bfaac262e97043aad2be90948aea5ba0

  • SHA1

    00e3025fbdd8717c9ea9da61451f87aef7d011f3

  • SHA256

    7454a3c35c8ec680c8a1427b551ab838b79748b301acbb9d4e4162e4c9917a1e

  • SHA512

    bc8e4bd0f52ec53c320078d6bb3c124bde077023a608d90bead0cfdd2fca7c2bb27ab797537a2656279470fa59c14640d056ecdab6a212e094ca344aa99d9426

  • SSDEEP

    6144:JmCAIuZAIuDMVtM/5ejyLAuVtXgM1iLq7Jz2DxgBRjczXlvP/oF:7AIuZAIuOzBD5g/jc5vP/o

Score
9/10

Malware Config

Signatures

  • Renames multiple (4075) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bfaac262e97043aad2be90948aea5ba0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\bfaac262e97043aad2be90948aea5ba0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1124

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4124900551-4068476067-3491212533-1000\desktop.ini.tmp
    Filesize

    349KB

    MD5

    be4d81ca492a310424ae5031317f3284

    SHA1

    58b4922d8fbf485cb9a0a7c91df8997e2cbf12d0

    SHA256

    0e2b82301d1277b70f88a5ccfd049e6829895a7006b2b9976dd8b3d3c23cdb92

    SHA512

    b028032199f3a919e9de5a68a71984bbb69d155d5d60e2e9786ec04773a7783495c3202c7eba585740f6f2c9b70d7e787b4b41a8842063becc8abf2031f975c0

  • C:\Program Files\7-Zip\7-zip.dll.tmp
    Filesize

    448KB

    MD5

    b924112f4004294cdb3389922c75835b

    SHA1

    a2a2bbb9a85740841298c69a2416f0be71acfc5b

    SHA256

    23617cd017c2fb16e6cca9fd0f1d0d8a1a12ec4f3e79615748f6328779fee915

    SHA512

    8039671d3f39561aee67de172e0b0dd7c8553cc5d45a999e3c1707590885aa855f4ef461f30e13717948eb4c9c4f06b1bf41fd5d21496ed698f8a19b7a17f4f5

  • memory/1124-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/1124-1338-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB