Analysis

  • max time kernel
    150s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-06-2024 00:08

General

  • Target

    113b6d41cc1881d466c5cb241d34b960_NeikiAnalytics.exe

  • Size

    116KB

  • MD5

    113b6d41cc1881d466c5cb241d34b960

  • SHA1

    d01057d090da8f2c6878766e8e323e37dde9e4d4

  • SHA256

    e1cd4ad99356df692c85411ff19b9e43f44eddf56881f0cec4092782b9268c24

  • SHA512

    ee1a2555400484241041ed41a5464988b45468a7a5166746a30ac45f6996ee04980dd01ae0cab71eeb90fc4367cadd83c98cebf55374e00d628f3223faa28a97

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hfliQ:hfAIuZAIuYSMjoqtMHfhflixiV

Score
9/10

Malware Config

Signatures

  • Renames multiple (4646) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\113b6d41cc1881d466c5cb241d34b960_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\113b6d41cc1881d466c5cb241d34b960_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:3380

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1337824034-2731376981-3755436523-1000\desktop.ini.tmp

    Filesize

    116KB

    MD5

    2c98f8d48da645c05461b6f08c931435

    SHA1

    70e25bb097af8c04b383e8bd2d66ee634b02c12d

    SHA256

    5ca1d52bc49f6c7f358f6ccfff15c76f8b5103e3e4bbd28d515750de02182912

    SHA512

    c1c7688e53fe29139ed99eb3ae992814cf23f666692cefb9b921215c9d43d41709a5efcbae4341ce1be652eb8c84f87a3585b4e10d7a5deed3da3171ccdc0af6

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    215KB

    MD5

    a8ad7c9dc4cc136765b5122fbec58f99

    SHA1

    fdc69545bfa77d1c008f9a119c5b6979ad6b85a3

    SHA256

    3281d7917d0a50c97961f1487382b705e0756332686c89565e104ea83e9521c6

    SHA512

    ad19b3c915ff8b2748ab87a0308838a28c2c8edc1af2c388ca979e1df1e95ca0b7a81c49d1096fcaac94ac4666cc46977032358401385032918531baf5fbfaf7

  • memory/3380-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/3380-796-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB