Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/05/2024, 12:35

General

  • Target

    44075fbb7410ce1e6719d622e1659750_NeikiAnalytics.exe

  • Size

    205KB

  • MD5

    44075fbb7410ce1e6719d622e1659750

  • SHA1

    2b8cc69871fce527d1a0e5d1380608e322d62bef

  • SHA256

    4bc1aa1a18d70791e632cf296d6cdead0a2373409f4abc7e48adad37dc5c8861

  • SHA512

    9d7a0fab9447c762d666ad91139d4ae75322dd1300dcfdb500d1c1401cee91b9965545db96cfcadcac47d72b1d06e1b1e19dae39d017c4721baac84d90d794d0

  • SSDEEP

    3072:enaym3AIuZAIuYSMjoqtMHfhfJ6W2QZwKS76D:wHm3AIuZAIuDMVtM/L2ZKS7u

Score
9/10

Malware Config

Signatures

  • Renames multiple (4133) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\44075fbb7410ce1e6719d622e1659750_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\44075fbb7410ce1e6719d622e1659750_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:4408

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3558294865-3673844354-2255444939-1000\desktop.ini.tmp

    Filesize

    205KB

    MD5

    f564c75fe69e5d30e160790e3fdecf1e

    SHA1

    0c03802c7fe681e183b1c27551bceb2af6fb2d0f

    SHA256

    25745641e199e4814a5336b2d57c4e1ecf02915fc11c2c011f1fa29ec78e533c

    SHA512

    3bac77fd94e5ab1a24f65069358abcb0d00f2abe1ce93e58f8f0b1dfe48c94dbebbbb313bf704d04cd1161ba129db5ee9cfdf999a57b0be64cc78a6bc3e75044

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    304KB

    MD5

    d3c5f536ef748961b54621a57229cb14

    SHA1

    63fe645e0edcb9e62ff8b2d935b404607442fd0e

    SHA256

    79441905fb24732e3d48f685a3f0fb2aa348935a1a2b5064047d54b794f6d0a2

    SHA512

    e12ed804bbd93a258e5a54b92f0fcaec3511b8d0b88a50012106730b21c18dc657c9fedf40fe1dfd7eddb9dc003a80983f10c543622ea09bab0729f6d3a00a66

  • memory/4408-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/4408-1416-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB