Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/06/2024, 05:07

General

  • Target

    207a28fa3bfa3b0e43844ab9b797ccd0_NeikiAnalytics.exe

  • Size

    63KB

  • MD5

    207a28fa3bfa3b0e43844ab9b797ccd0

  • SHA1

    7e953e3347dc2398cc5ffe6bc9fdea353adabe30

  • SHA256

    878ddecf3efda6ed1958fd790883f807975dba3eb7511926fd95ce1af251c5c8

  • SHA512

    479bb561eaccad5a1347e05480cf487d6961d690dc50e0511d7b3ed812f2040eecf37ab060cac44a78b2132d7411969206a7a3677919ef8c8ae157028bc303e2

  • SSDEEP

    1536:67Zf/FAxTWY1++PJHJXA/OsIZBX5WX5sJUDJUX:+nyi4MS

Score
9/10

Malware Config

Signatures

  • Renames multiple (5325) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\207a28fa3bfa3b0e43844ab9b797ccd0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\207a28fa3bfa3b0e43844ab9b797ccd0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1724

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-4124900551-4068476067-3491212533-1000\desktop.ini.tmp

          Filesize

          63KB

          MD5

          fe319b727bfa096799a4c012c633dd20

          SHA1

          204fa87ee9a462b2430d9d5669f383fc7367121a

          SHA256

          59c565db964f38965c3ca392ece62fab3f110575bb84b979f30610f26f361509

          SHA512

          ef5e34a211689f2a9a48ca918c6400874cdaeb2581c999db7dcab34510d76603a1767a6b2ac02257336bf15f84f000214d09925d1bbf1025b7b06ded74016661

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          162KB

          MD5

          544dddbaa9b430db873afda38ed63575

          SHA1

          eebbfbce4b8fe184b58107d945db95a3537d08ac

          SHA256

          d17c22bd189f8c3c8538bb9825143d83d5c8dbd13e208091aa470d26a7849a6c

          SHA512

          1e860ee0b97a828c4439b10e1d44cd959d21e18e5339d917c088f40eee01715894e524d38c4f630c6ee4fd702b0587b2c840dd9cdede01e5443eb01fa57c744a

        • memory/1724-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/1724-1988-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB