Analysis

  • max time kernel
    150s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-06-2024 11:23

General

  • Target

    52d5cd572b25eba24a149afaae363d30_NeikiAnalytics.exe

  • Size

    1.1MB

  • MD5

    52d5cd572b25eba24a149afaae363d30

  • SHA1

    e1cabcbf0c8c1ff445ac1d0a253cc0f8f494deb7

  • SHA256

    735ba045a2d19e360323a7a34f97aeb7d8fadddc8f99057fdf0cc7914abe9d1c

  • SHA512

    4f49e76abe8d795ad8e371dde4fa2b396efdbf2f9e4f272a12b45f5e94758ab0d62b80f72b5791e0a8f041060c21a1e8b5d5ae975cf39d11368165c8ab5c8637

  • SSDEEP

    12288:IAIuZAIuOBgyO0kdH3B6yhiLzi+QqTHjfFANj0Ow3wU:NBgKaS3wU

Score
9/10

Malware Config

Signatures

  • Renames multiple (1880) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\52d5cd572b25eba24a149afaae363d30_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\52d5cd572b25eba24a149afaae363d30_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:4132

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2539840389-1261165778-1087677076-1000\desktop.ini.tmp

    Filesize

    1.1MB

    MD5

    c89fe6871424c295362c056458c6b057

    SHA1

    0e2065c258613fbab5cc74320367a5f6f1434cde

    SHA256

    89c397d95ccde6b379ee82faa59cb72547b46688645eb3f45ae3af9f6bcd4aad

    SHA512

    86bf4db7f724b1ffe38f94a2db3bfb3cda52682a6715bf3d57e0755b244853fc046e75c1761db1eee7d8755a08c8bc4835512c296dfa4c07ec4820bbf8e48652

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    1.2MB

    MD5

    c276e38722217c9b006fc8b20d55518f

    SHA1

    8eea2c4a1557b1a2d06e6e8b5dfbcd12b66e4189

    SHA256

    d5217ff3b9f651311814c355fbcf3f22d46cb5907ef4fc441d3de864c0e5c3bd

    SHA512

    e0623119bc61bd9068d4d48321967204fbf7cace9a40e96540ea437efe8d25d178804807cd6706ac2bb0fe457f301463219ca984d387335b8e2a19a4fa4d7e49

  • memory/4132-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/4132-760-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB