Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-05-2024 00:21

General

  • Target

    28f3c75c653b68e6802f761038b5f180_NeikiAnalytics.exe

  • Size

    63KB

  • MD5

    28f3c75c653b68e6802f761038b5f180

  • SHA1

    b46b213056cee12ca58c8b0ae5d6680dea3085eb

  • SHA256

    0d984e87a34d76e77b7a12ccd7ed8b31af7c52b029c340929e7af6fc1f1e6899

  • SHA512

    c9dac0271d21437cdc7979538df4e12395692e63b5fb76187a142435880d4031f9c663d3d7bff96512cea312a50daeac62981fc36832fce88172728fba2f38b6

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8Q:fnyiQSon

Score
9/10

Malware Config

Signatures

  • Renames multiple (5194) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\28f3c75c653b68e6802f761038b5f180_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\28f3c75c653b68e6802f761038b5f180_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1672

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4124900551-4068476067-3491212533-1000\desktop.ini.tmp

    Filesize

    63KB

    MD5

    b4fe4ae939ca3305ab20adbf318855d1

    SHA1

    8a4f7511b09d7aed2309232f9a15bae289a30251

    SHA256

    d0be9d5d87f7ec8505bbb5855c615fc44c4c70eee4da075438f0250af387a932

    SHA512

    3d08980cc11d2bb8ec1bc1acea0f9d55031c51041f640d7664dbbc881ac2a6dc030c9edbea5bf7bd5004ef1d9c4e082e8dbe3daf2ce65c20ed831054add495d9

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    162KB

    MD5

    bf4b3912a08629e72a4dec7a63186d3c

    SHA1

    80916587bdadbb512f6d00ad9d2a67cff17d0f9b

    SHA256

    faa19d4bdfca6aa1c9bc58eca3ede44c4b8a529fbb729541f7eec001763f66a8

    SHA512

    cdfb7f4ca6068d85a0669297cb0816501c88c63d04abdf812e8184132fe282c3845318f0c3d7587bcb8c448e27f7c6256cadf07e1bf6e73b9186e76174f31702

  • memory/1672-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1672-1948-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB