Analysis

  • max time kernel
    149s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-05-2024 23:53

General

  • Target

    5b528e46ec751a4212cebe862ee77f10_NeikiAnalytics.exe

  • Size

    47KB

  • MD5

    5b528e46ec751a4212cebe862ee77f10

  • SHA1

    aa8a9a74a533a0eff0491ea47c1ae5512cc8d007

  • SHA256

    d39c179c215c72fbf0afab02461a35f85294a9101e5d686b7a84b99e16ea0414

  • SHA512

    f854578ccac0db00a089bb60206c438e192d40808a4980a3d2b7440744883f50603121fcc53154cb080287cd9c416ebc62faffc6e37c1365e64f67c54ab11918

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFx7:CTWn1++PJHJXA/OsIZfzc3/Q8xJJMJJQ

Score
9/10

Malware Config

Signatures

  • Renames multiple (5007) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5b528e46ec751a4212cebe862ee77f10_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\5b528e46ec751a4212cebe862ee77f10_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2936

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1162180587-977231257-2194346871-1000\desktop.ini.tmp

    Filesize

    47KB

    MD5

    c09baf2596803dbac094a8afe699615b

    SHA1

    cf3e6f345e4340f1a896cd141a97a4403fea62b4

    SHA256

    f9985e0272320f0c7106b30a96d7bb7e548643de112698b455d62beb994ec74f

    SHA512

    e8fa3fb6a2eee9eb270324dd6caaa6f778aabc1d797d8ecba9b839830b86beca50df7b2a8733da25fb2d976b0cf3f8d4695101eefa79de5ab0b9319aa1562cdd

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    146KB

    MD5

    a968da82cc476d82e1036fb97d04e8c0

    SHA1

    40a397e773ae34703cb34a7c372ae6925fc88541

    SHA256

    62ea2c395c8a7c5728598f40c1fcb0b0e469bb21521ea0e43291859a32099a54

    SHA512

    99ea85f28c07eadfc32181ec4e6aca3cdf1d90d1b1c88aa1d669085faeff93e155768ab3ea1e9bede7a0d95cc491ff9d477b8aad9655e6116c52b9a11f046fb6

  • memory/2936-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2936-1100-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB