Analysis

  • max time kernel
    150s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-06-2024 22:37

General

  • Target

    738a26e2132dde35dac548f48d35c280_NeikiAnalytics.exe

  • Size

    131KB

  • MD5

    738a26e2132dde35dac548f48d35c280

  • SHA1

    0e1c56c971e05c0f6c41da3cf80d19e2968176b2

  • SHA256

    4e7d7aadfdec06b704810a6038d5e97f09c19fe29b83a07fcc8120ccd6c52365

  • SHA512

    0150bf307a188866169a6f3b477e820032ae3116f39048aba0399ef604a66bff4656e918dc34b94796c8dc87ca13ba050c5af064db9488ad7a7b6c3d102817ab

  • SSDEEP

    3072:fnyiQSot+opbmMS7BSFHQi8bLRCw/UnEllk+kffteA00afFk/cs2/n+Zlomxgr4/:KiQSofp+u

Score
9/10

Malware Config

Signatures

  • Renames multiple (4970) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\738a26e2132dde35dac548f48d35c280_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\738a26e2132dde35dac548f48d35c280_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:464

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3558294865-3673844354-2255444939-1000\desktop.ini.tmp

    Filesize

    132KB

    MD5

    5313f2e27646f719d86c82b1f3481485

    SHA1

    fc64f775074b10053897e8a0fa86d87756d6649d

    SHA256

    f5f091fb08e2b16b5e371a15aff51322683ff7611a10f2dc909334f5c293f062

    SHA512

    de574ea440bfba6f03cf7dfa7c63a9bc717b6b5de24f48f3916f8623fd5ba0f3dd2c50e456143ef9b6fd0e67603e26fc32d4a379371d1b045e1cbb907e1009ee

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    230KB

    MD5

    dcdd6655bd14caa73493075235d1e7ae

    SHA1

    7529a356786b58d8c2a5c7e1c00065866bb8e97b

    SHA256

    d60fc8693458f9e5123c378705d40aaa0c6e31ba6b91cd3f6f977e6dee1eeca5

    SHA512

    ebd0665a12b971f707b37e298d23ccd6665518b7bb03cfdab3b40956d8b5ed4af0dc79310c5dd28cfd4ab5a46617845ddd3878055519c389ffb4b8b11c1890e6

  • memory/464-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/464-1780-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB