Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/06/2024, 06:03

General

  • Target

    12b6c5900bdc0a00739f69bf0a41f1d0_NeikiAnalytics.exe

  • Size

    76KB

  • MD5

    12b6c5900bdc0a00739f69bf0a41f1d0

  • SHA1

    796c62621c30c88298e81f9f3770d01676b01676

  • SHA256

    afb198d78e6d177b39ff71f2c996644cfecaf8d4669a2dffd6999e2c22cc0052

  • SHA512

    e5cec54f7efc0c846e8cb80ae590dd15e4b6f3a14183da83a888b666ef931fbc3a3e9fde500e73c9bbbff97d99e9313196432ac110d9a8e360822073abf937ce

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8sWh:+nyiQSo3Wh

Score
9/10

Malware Config

Signatures

  • Renames multiple (4835) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\12b6c5900bdc0a00739f69bf0a41f1d0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\12b6c5900bdc0a00739f69bf0a41f1d0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:4420

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-4124900551-4068476067-3491212533-1000\desktop.ini.tmp

          Filesize

          76KB

          MD5

          70c39acd4ba481878d8a1bdae8e378a6

          SHA1

          9512015a7d3ffb8368922dc94b14e5e4adabf4a4

          SHA256

          c3f2288cd0937acea70036f2de205676d503069ea0b3fe2fc70fd787ea187599

          SHA512

          cbced1fc895311817f27b7620696a401d80992e40de4cf7fa697f96a7c114f03c3dd2ae900c70d0c17e4ab6e695906d0c0121cd1cc4186122bb698ef1fcfdce1

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          175KB

          MD5

          dceba7b1ba7cc43d29d9d2e9a02a5c7c

          SHA1

          4d7be33ac132c8ae0a8f1c654630cf992a77d3d8

          SHA256

          86774cc59930d454200bd3529e0b6c4566af4574e795bab3e9980f46cc6dc994

          SHA512

          8ebd594fedf4410ca0d024c8588b65dd5fe79bc21fe842b84ffd234db3a31d467edcdd5475b5fbc30be4c53d2b9aa84f9fe645843dcda364125114fa483e6a85

        • memory/4420-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/4420-1766-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB