Analysis

  • max time kernel
    150s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-05-2024 20:27

General

  • Target

    1b66f1dd9729ade1d4a1277356553310_NeikiAnalytics.exe

  • Size

    202KB

  • MD5

    1b66f1dd9729ade1d4a1277356553310

  • SHA1

    0b6607b7161e09635d9d010f93dd875ab9b7ebd2

  • SHA256

    23b6b02888e21c328eb443450d2d960524117c90c7d664f4e101c43dd554ea54

  • SHA512

    66f0d4d732e31e9429f36a41f3e2dec89dfbf42242528970acefc3dc1348fdc8e8cbb2e65b3fb5b29178f8bd076aab8cc603cdf1dac9319eaabe5fc9f824fbc8

  • SSDEEP

    3072:enaym3AIuZAIuYSMjoqtMHfhfJ6W2QZwKS7y:wHm3AIuZAIuDMVtM/L2ZKS7y

Score
9/10

Malware Config

Signatures

  • Renames multiple (4637) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1b66f1dd9729ade1d4a1277356553310_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\1b66f1dd9729ade1d4a1277356553310_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2944

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4018855536-2201274732-320770143-1000\desktop.ini.tmp

    Filesize

    203KB

    MD5

    ae0bce1dd278d1eae2829eb53b90de72

    SHA1

    16c6eb72956e2dbf571172e90270f585b4d25770

    SHA256

    c41fa0ec7190707ef36a9756c806ad113fd5ead956a9b7107ab5a319d34e976d

    SHA512

    8494ba78ea4312cd05a6bed2eb66258520f05d385b026db252d6f00f939df87b64738c11d21cb520b287434225221e0a9daf8677418fee3fbe8f9ee55641cfd6

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    301KB

    MD5

    b9a3a02edd582785a2c073d9dd46647d

    SHA1

    e1e2c129108ecbce91a304d649de7ccdc2b79941

    SHA256

    2942ec3283aa6009595c2f9635a1f10de2b582238699f5140a94f4ace8ec983f

    SHA512

    adcd85d31a1a6bad2c35f783f9b93fe90d0b55d3e0017a53b6fca80ab18ef535779ff6026e5684af7a391b882eae13230f5d70862285bba67919a1553e63758f

  • memory/2944-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2944-1578-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB