Analysis

  • max time kernel
    150s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/05/2024, 20:19

General

  • Target

    175183b49183c7e6b1235b7f6395afc0_NeikiAnalytics.exe

  • Size

    41KB

  • MD5

    175183b49183c7e6b1235b7f6395afc0

  • SHA1

    76552da94e837e43cec89d28126d607a9f2837ac

  • SHA256

    9c0b8e81178b1f9ccd714a1c893c25bd3d9066648e7af6bf8d86c6296f2f0801

  • SHA512

    aaa7d3c8dd7219ebe856ab46dcc9d04b52ac38fa5daebd5d2d763b59bf07d96e5af2ac1c9dafcc450c47b068ed0bd69083956fc1156316c50d5738b23aa4182e

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFkv:CTWn1++PJHJXA/OsIZfzc3/Q8k6g

Score
9/10

Malware Config

Signatures

  • Renames multiple (5217) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\175183b49183c7e6b1235b7f6395afc0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\175183b49183c7e6b1235b7f6395afc0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:4820

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3906287020-2915474608-1755617787-1000\desktop.ini.tmp

          Filesize

          41KB

          MD5

          3c11e2d74e25ab22b15deb0a2a7e5532

          SHA1

          5e92f676a2a6a1d27cc23bf5ea95af59897d2ac1

          SHA256

          b4ae87f506a1ee382b9b3cb3e23ddfe77c48bf93862567581ba1bfd0ca0e9e75

          SHA512

          c0fdcfc84d0a261c80f145ea280e8e16d86d5b93b5c4015f45fd704406888438248255fbdcbe7ab1a398c6bce9aa77de4ab57f74e7e11151597857d1d4456d81

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          140KB

          MD5

          548e70a0aef00da598d801e8cc3dbd41

          SHA1

          a744d9311121a136bf59daced8a700143c14fd4d

          SHA256

          36224d5bd2e9215126c6a5b9becedfea087797bb76f39531d1369e420beabfa7

          SHA512

          af244c54b6994acee0d731e03be0143957d27a16fcdc775880bfadb95cb8c14e33271e772cc6e0afffc6f4d16c212dbfe34b372673529cb1e3dde06c07015a61

        • memory/4820-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB