Analysis

  • max time kernel
    150s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-06-2024 01:36

General

  • Target

    099dee1ce1987d98ecbb8fff801947d0_NeikiAnalytics.exe

  • Size

    71KB

  • MD5

    099dee1ce1987d98ecbb8fff801947d0

  • SHA1

    5e60630413ed61443f79272104ae144a3bff3b22

  • SHA256

    bdbf1149aa09ab43b4493732639da311ddee2fc85971709b1228e62a28d3d672

  • SHA512

    ed6a075bf1256abb309954c12c26616c3449329f3c2c4ea78eb329523be473e21a7efa4ccf70c5a8e335913d7b8b5abd7db740c63691401062fb5a522c783246

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8q2U:fnyiQSoT2U

Score
9/10

Malware Config

Signatures

  • Renames multiple (5188) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\099dee1ce1987d98ecbb8fff801947d0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\099dee1ce1987d98ecbb8fff801947d0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:4796

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4018855536-2201274732-320770143-1000\desktop.ini.tmp

    Filesize

    71KB

    MD5

    5c66963de733514aaac8e6c8e8e9bce3

    SHA1

    e53ac732978b79e4c833c043c8629ab4ad263512

    SHA256

    6e858cf618db77767f4a41dfc2f819ed90f0dd8c0be375566c43b1f9df2834d9

    SHA512

    d6ea0fc4ef133e8531cf8c165e3195aec3dde7e6b922174ae87926071704b2f18e8b0f9073dc3e2c2869e4ebdb357701c272e96767bb1f1c0ed48293d08a75a9

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    170KB

    MD5

    0e794d134e57fa5ad678eef54995b80c

    SHA1

    f26e4d831ad973f4bdab2aab2d2757937c453ab5

    SHA256

    137394a8de5915290ea171ef196abd653b7ff7acfedc0fb150bb8fb3ccc6d223

    SHA512

    2b5c622f46039c66af82a4fe4c091d78adbeb4b57f80288a15af2a1299ed6183854a038d167c2fb5554bb178876c5bea92b384691b6e291bf6fc001e2e64062b

  • memory/4796-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/4796-1910-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB