Analysis

  • max time kernel
    150s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/06/2024, 01:22

General

  • Target

    87e37b675ec11f62e23823bfaddcdcc0_NeikiAnalytics.exe

  • Size

    77KB

  • MD5

    87e37b675ec11f62e23823bfaddcdcc0

  • SHA1

    8ac14a95b1d4c8b5155ed2034297e2a39dd23a9c

  • SHA256

    ba4180a66284ed4b612c6d6919aa8a13d293ffc78bd9cd0d30e5817900fe3b23

  • SHA512

    92cc8b73941d9347654ec432104b58e82547a09ecf566b9b762f908d8007123a6b8b5cb3df2b025f877e9d54a0b1b3cd6acda9952e70815f355f68668b87c1cf

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8BGizN3:+nyiQSoKXzN3

Score
9/10

Malware Config

Signatures

  • Renames multiple (5028) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\87e37b675ec11f62e23823bfaddcdcc0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\87e37b675ec11f62e23823bfaddcdcc0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:3088

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-4018855536-2201274732-320770143-1000\desktop.ini.tmp

          Filesize

          77KB

          MD5

          000634d4c7770df42fd45987a3e3ad86

          SHA1

          d097fddf12b5ff247731382005490af624d598ed

          SHA256

          5fd01caa582da7cc299747aeac6f104e186042be971857a0725c25e16ea79652

          SHA512

          8725d763c7c5288ec22e0c41e31a79bc374ca4464d258789a837834a201e4956e50e7c69e80ab9903dc0f85cb9ed87bf1ce1e54e93e206fe924f91dc59527a8a

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          176KB

          MD5

          abb06bf9dd436d8f2e4daa62c5be37c8

          SHA1

          7add1c7508a993b7af5306303f9dccb20be376f1

          SHA256

          e93b03f6ed663111b0e9b38fe799ac377f9157c0fd2ddbd6fa94eb493037e79b

          SHA512

          9da46ec23c3b1240b7f4a5cadc0057df32c58e8c28bb6aea7bcfae7b3296691043e66079b24662ceb9f7350526e69fef9e13a458e5c22e066569de6ded8b60e1

        • memory/3088-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/3088-1782-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB