Analysis

  • max time kernel
    150s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-05-2024 01:54

General

  • Target

    4cf76a49efc4f88ff48b23477edb4a80_NeikiAnalytics.exe

  • Size

    70KB

  • MD5

    4cf76a49efc4f88ff48b23477edb4a80

  • SHA1

    2e7629340f1a434fa896510cfb9f01fc2d8b3484

  • SHA256

    69f98bfb43458cd47bdedd6b5aa1b79494f6c196c71abbce0c4ff34efdeb7f1b

  • SHA512

    b8292f38339bea8ca900ae3d6ddd24b2e11c24073c9ac13a72d0ef021fa619678267ee83f6a076a35eb6eb56287664292bd298d4760be28661f57b5586b3fbc6

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8asUs18/8T:+nyiQSohsUsOkT

Score
9/10

Malware Config

Signatures

  • Renames multiple (5201) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4cf76a49efc4f88ff48b23477edb4a80_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\4cf76a49efc4f88ff48b23477edb4a80_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:792
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4396,i,1067197275908310731,12785105794523264014,262144 --variations-seed-version --mojo-platform-channel-handle=3888 /prefetch:8
    1⤵
      PID:4360

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-1181767204-2009306918-3718769404-1000\desktop.ini.tmp

      Filesize

      70KB

      MD5

      ad4c40c9b1e380423b5d8926b3d111b7

      SHA1

      ca40c4c7bafc855de6fbf6d398b8fbe76f7702fd

      SHA256

      d607ff5f78bd1f9567342dfc5c23ce15ce2de7f3a5c5376bb7886e03b9c0ccfe

      SHA512

      2cefb66f80b54b527d329614062e7f64d0d0d5686a7240edd6fd6e16a9152a10bb618733c9730c72768db6b75ef6f7093f4df7af1108c8ca5920390190892333

    • C:\Program Files\7-Zip\7-zip.chm.tmp

      Filesize

      182KB

      MD5

      a1d4ab0989f874f807dc0c141ce2f532

      SHA1

      4b25b38c7f066820acadd4af514a9a4602a9fc01

      SHA256

      97a904186aec5e9b7eeba9cb5925bdf2a653e717399ab826e86271b40e051d6a

      SHA512

      0f70e9bb5cb74f9a90cff916d2f27a4e9b57f443b0fe0ccbfc45682f4517d987de852aebef1c5a38038e6a0df3381b22307b7d9479cb0520b58348ed5d4e0cf5

    • memory/792-0-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB

    • memory/792-1960-0x0000000000400000-0x000000000040B000-memory.dmp

      Filesize

      44KB