Analysis

  • max time kernel
    149s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/05/2024, 12:55

General

  • Target

    54b63a31191d0febcf7c20715090e060_NeikiAnalytics.exe

  • Size

    203KB

  • MD5

    54b63a31191d0febcf7c20715090e060

  • SHA1

    6fa6cedccc12b3d2b1067dfa4901796c447dd7d1

  • SHA256

    010b58f8f19150a348a36456a26e27c300084b1b0fb3988388da953115670b9e

  • SHA512

    a5321a39077d51b3658c2f1cf13028cce1fe52f2a8d3c32a2bdd69bd2fbad7e14de508f4655bfb46f39244bdf1b6af4eeff23a430e64d5f63091850ad7786c43

  • SSDEEP

    3072:enaym3AIuZAIuYSMjoqtMHfhfJ6W2QZwKS7H:wHm3AIuZAIuDMVtM/L2ZKS7H

Score
9/10

Malware Config

Signatures

  • Renames multiple (4666) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\54b63a31191d0febcf7c20715090e060_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\54b63a31191d0febcf7c20715090e060_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:4652

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3906287020-2915474608-1755617787-1000\desktop.ini.tmp

    Filesize

    203KB

    MD5

    f56fa4fdc5333aa8c06d61f43d10b8d7

    SHA1

    96f796d1767c08cf39089aad037d5850997ca0e8

    SHA256

    0b00626899b593bc53e465f2ebc6a8370578075f88e4c5037d7e2a37b6cfd37d

    SHA512

    5d76e6bb6d951721741593b6df1c6be61a6013806a4c2b8b0254dfdd1afa545272479cc0c6add592b0f4697bfab5c9587675cb4685565eb2e717b9b9889b95af

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    302KB

    MD5

    e1c02f3269c761cc4bba479b1dd6f13e

    SHA1

    b1422ef2454e307b2610bd5f810df189b5d8bf5f

    SHA256

    fe228419adaa50f8d46f432b45356990e257c2da03007e542d378c9738011cd3

    SHA512

    61f2d37c1aae7fed9cc5d527c0f934507040405649efd9a29b2cb4975b24115b32ff026ccadf4f8a3bd6a888db7a76643f3d01e03a217993bb819e265e86e535

  • memory/4652-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/4652-1604-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB