Analysis

  • max time kernel
    150s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/05/2024, 08:05

General

  • Target

    3a298c535afa97cb6171380d6116e760_NeikiAnalytics.exe

  • Size

    74KB

  • MD5

    3a298c535afa97cb6171380d6116e760

  • SHA1

    37cebae17cfc577c56f59ff5765d40e631f296f4

  • SHA256

    6c813f90d55c4db0b2b4f868a156154976f21e5a7eabd88f6dc71aec25d56f68

  • SHA512

    e5d8091e0e9f443ef26f001889db155a7e8013b50cf3b9b4b5f4b826e8a94738e6623429a8a9ca48a8b3498bd130c6ef1b6a88a6a3678a2cb9d102d1ba990ce9

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8xJJMJJcLy:+nyiQSo7

Score
9/10

Malware Config

Signatures

  • Renames multiple (5033) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a298c535afa97cb6171380d6116e760_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\3a298c535afa97cb6171380d6116e760_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1440

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-540404634-651139247-2967210625-1000\desktop.ini.tmp

    Filesize

    74KB

    MD5

    c7ca5922b4e431a8a35965f5d59c1500

    SHA1

    21667d68d7fbc72224cadb1b575a1ae76a5e1a3d

    SHA256

    f9e8641bd867e21ad8b62700185ad8f5cc5931bca80387b3c6e3e50051f0ab15

    SHA512

    d9645fdb37e8773c8d894c3e237ed7364021847cf150c9762b7eba809e70fd328380b4e50e6f5c14488dc90e6b690969353162733bda0ad558bc79f9b75f3c31

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    173KB

    MD5

    a8a23d9a70c0b73a4eb17d80665ddcae

    SHA1

    fd6a67870a6089dcebf9c1664e3a222fa77c278d

    SHA256

    ab79239572aaac36b14dcd8dc30a570f9adfa4d0136703db132a00c1922e2ee0

    SHA512

    ea404d66528d516e44adfbaae3a6b54fc3bf700fea3a8b59a31ef9c8be75f54290ef7c29346b6e964ac05c51ebc71afabe9eafa9368a4fcd19e8adda04ad244f

  • memory/1440-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1440-1794-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB