Analysis

  • max time kernel
    149s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-05-2024 19:20

General

  • Target

    0fb464bf25da53b9ec21dc4edec28f10_NeikiAnalytics.exe

  • Size

    72KB

  • MD5

    0fb464bf25da53b9ec21dc4edec28f10

  • SHA1

    a4d92980aea7339ddb11d8972f098d44cab1d404

  • SHA256

    504a1f79aeb0a6c93d9bdd71aed0c26095c71627ae22923d0fe981de76261161

  • SHA512

    1a63cdd6e87dea4bcff0f0856ccb4a7a7f7ca57b8026995551ce74c351eb53e35aa402ad78625106f449b58dbbc2d837ea5708d9aed573d174c98b64453e3e6c

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8xJJMJJu:+nyiQSog

Score
9/10

Malware Config

Signatures

  • Renames multiple (5000) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0fb464bf25da53b9ec21dc4edec28f10_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\0fb464bf25da53b9ec21dc4edec28f10_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1020

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2539840389-1261165778-1087677076-1000\desktop.ini.tmp
    Filesize

    72KB

    MD5

    0da9b11a32d8cb3cb4c93f98e4cbbd75

    SHA1

    77c5835ba781be32ade7047a91441479ca921c52

    SHA256

    ee9c3de10bfe5102824d0b2d21915e8b67fc6fd5527b13999f849e34bcce6ebe

    SHA512

    fbf1bc5d01f912ac4127dd49e2545f1c4e8f57fbeac46f1065e9d6254d6267654dbd68c155663fc941eebf0c4b67f8e20876e67883cb9539ec8c45e3580e4c13

  • C:\Program Files\7-Zip\7-zip.dll.tmp
    Filesize

    171KB

    MD5

    ed8136f29af15478a3f5b0f3aa57608a

    SHA1

    6caef1197cae6cb21cbc29b747800854968e24b2

    SHA256

    5af2f0e3901bd4c5e75a32268fdfb50c7f6851455338d6c1e86863d7f6943016

    SHA512

    7244db3de567bd09df717429b6aa9b7aa907a9e3b75802677e0fc243b3fc14db92d944e539e375a02aa05aa2659148c35ef10da75639110af9f8f749a71f8324

  • memory/1020-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/1020-1776-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB