Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/06/2024, 16:28

General

  • Target

    6f4690e43624c3da461b216328d0d440_NeikiAnalytics.exe

  • Size

    360KB

  • MD5

    6f4690e43624c3da461b216328d0d440

  • SHA1

    86ff1ec60544df75936f8a451809ea88a37f2b46

  • SHA256

    228f260789fbbc01a5c619735b2c0af487462d536f4a4114965a0f7a2f68418c

  • SHA512

    96450935d8052618d49d16cbb270c9c252cf30a67bee838486fb1c7be5ac19a137ae7a7ec7f2efe3c0854ae3dfa7dca266aa54d790ca54641d222287e7d07dad

  • SSDEEP

    6144:KiQSo1EZGtKgZGtK/CAIuZAIuaQSo1EZGtKgZGtK/CAIuZAIup:VQtyZGtKgZGtK/CAIuZAIuaQtyZGtKgw

Score
9/10

Malware Config

Signatures

  • Renames multiple (4308) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f4690e43624c3da461b216328d0d440_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\6f4690e43624c3da461b216328d0d440_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1196

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1337824034-2731376981-3755436523-1000\desktop.ini.tmp

    Filesize

    360KB

    MD5

    356d6009cf6567c6d1a310c1a5dce8eb

    SHA1

    dd5137eaad2357541d551438e354aa8629527488

    SHA256

    5c7375446f10aa0900f9022e709cf5b220be18878883830d424b997134dd5f13

    SHA512

    fde2913b35e46ed8e72b1673b7c5eb848a6c5bee1a5a8a81a11d7123eaba4d0b7c413ac5a9d9df0634eb69462a15c345713dda08b9234b728b50c0e6b1168ebf

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    459KB

    MD5

    afcb666f20e7b66c59a9205b781b14bf

    SHA1

    2c23c8d4fb8066bd1e1f8a8abe703fa24fc6f29c

    SHA256

    29ec4185ac24f3e7eac175cb217d62a1f4c59783669795e956b8ba2df8db0004

    SHA512

    573aee2c99f852f664729516b1d349971b941cae09f4bb56558710a8eead48e6aaeebc80272880beb3c933088efe35533436490eaa000233207710b38340d0c7

  • memory/1196-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1196-1420-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB