Analysis

  • max time kernel
    149s
  • max time network
    106s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-05-2024 05:15

General

  • Target

    6ee8ccf365a4ef8fd29889f2fe1d5950_NeikiAnalytics.exe

  • Size

    103KB

  • MD5

    6ee8ccf365a4ef8fd29889f2fe1d5950

  • SHA1

    081e6a075f5980c2da1e607c65dbacb9c44b42bc

  • SHA256

    40420ee419c251c03090fcf46c36ea712a6a62fdd978c406bb14a05fd47d22b7

  • SHA512

    7e4a2b378ae52ac75d3d4a7ba3cc573df4c0fdd5bd6aa50a0d9bfba19b0d88ab7334c0cadd6fb3152e651a38ab5669bd5a8901a966b8d9eaa5087a46c3586019

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hfOA2:hfAIuZAIuYSMjoqtMHfhfOAkfAkN

Score
9/10

Malware Config

Signatures

  • Renames multiple (4842) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6ee8ccf365a4ef8fd29889f2fe1d5950_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\6ee8ccf365a4ef8fd29889f2fe1d5950_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2172

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3906287020-2915474608-1755617787-1000\desktop.ini.tmp

    Filesize

    104KB

    MD5

    301591ebe0ae75073a0412b9a07d581d

    SHA1

    366cbeefc0b2207a33d748e24b1b24a8efaf765d

    SHA256

    d262c0c1e24cb9a7da6eda8374799e64289648dc53c58305827cc03d6c9fb201

    SHA512

    d144ebe19117eabde89aaa411c866f2b34fb9fbbfe7f4bfe1c21f846dbb43d73f6e111c9351e0236f7fb1cb0ed5dcb77d3679f322068324e1004afa11c2b6bc1

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    202KB

    MD5

    626cb969b7607236584caf0cd3c8e4f2

    SHA1

    ceb11ed51649ef34928e914a2db226b0aaed51a6

    SHA256

    1998bcdfd56432e4efa9e0894c8354149fc4b339f32fadb18fda9b5aaae05e19

    SHA512

    f49f2ff47f51c01b3054f08a459522d9878d30c9aa8593ff25358477d8d35ec4bc54ae56eec660cdafbf2cc10cb94917f7f02a403b8158eef9b706fdacc19583

  • memory/2172-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2172-928-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB