Analysis

  • max time kernel
    149s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-05-2024 02:00

General

  • Target

    4e31383fda1d331c4457b76475b376f0_NeikiAnalytics.exe

  • Size

    73KB

  • MD5

    4e31383fda1d331c4457b76475b376f0

  • SHA1

    30183d8d7bf91f39dc12f5695038ea2134d0215a

  • SHA256

    5303392831813debcfa3316caf0506efa90d6b4eed98b5b412ae2bb0de5fec70

  • SHA512

    8a5744c5355fddcb1636b29c7896d183ac7dff2281d428773b17cff1423d61c35f4d38fc4b2550c211b9958faca672f7531bf4e2b7d8096dcc7ae4baf029d98e

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8asUsDzVe/0AP:+nyiQSohsUsa

Score
9/10

Malware Config

Signatures

  • Renames multiple (5020) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4e31383fda1d331c4457b76475b376f0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\4e31383fda1d331c4457b76475b376f0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:3260

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4018855536-2201274732-320770143-1000\desktop.ini.tmp
    Filesize

    73KB

    MD5

    f26bc50df2e93fc53c3b62d3e4b5bc7a

    SHA1

    68e11cf861cea429f9585472d3a8fd8b4fe20c24

    SHA256

    3b9ceaffad5020eb377e772962a48fdb209683efadb0db05566246828d383377

    SHA512

    7b6a381c0a57529f29fab6b0ee8532173dbc243483d20ce6019fe3ca2683a6acd0ae01f19f381a3bfd1fd36dc0ff0840e96d8ec244af9665b8e57515fdcd357c

  • C:\Program Files\7-Zip\7-zip.dll.tmp
    Filesize

    172KB

    MD5

    20a66e66aebfc803c85b3c21ddb67497

    SHA1

    9849a33a1792c6773df68cc64dc29425d5e2e70d

    SHA256

    7d37a24c9c46bcd9bbf991eb769fb13e2fa72aad83a8b606c2f12f72d28379ac

    SHA512

    e12a15228e30c9b3ec7a084897d9bc7a47c8d45db99cdb85dccf7b67e38f216f03f2d0c207a5c39e9b85311785eef816ee448e44a15b693d445af6c14669b771

  • memory/3260-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/3260-1804-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB