Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/06/2024, 21:27

General

  • Target

    886effe70b5dca28ced14cb2c5ee3720_NeikiAnalytics.exe

  • Size

    70KB

  • MD5

    886effe70b5dca28ced14cb2c5ee3720

  • SHA1

    5f1c099a726cfdc4439ca61800bddbe4c4fb53f0

  • SHA256

    c21b03bec7a6314638a85162059a5ee53c2df60d07089706e4864002a39a77df

  • SHA512

    052b0e5a73258693d38c6214745f2ec66f8edaf7bd0f179010294f4ed4cef89b94d76246ab1f6040c2ce18b2c2c204e8786a8603dd42897742454cc25a12611a

  • SSDEEP

    1536:a7ZyqaFAlsr1++PJHJXFAIuZAIuoJIFH4JIFH4:enaym3AIuZAIuE

Score
9/10

Malware Config

Signatures

  • Renames multiple (5252) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\886effe70b5dca28ced14cb2c5ee3720_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\886effe70b5dca28ced14cb2c5ee3720_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:4788

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4124900551-4068476067-3491212533-1000\desktop.ini.tmp

    Filesize

    70KB

    MD5

    768695162496417e8f2a9fa2c90f0678

    SHA1

    f445054d5b4ff1eda882bba241809ff9de7b19a1

    SHA256

    92cc1eca6277837cf2a3e894abedb4f943ae3ef3bb15e5a6ec3c16d54599bb37

    SHA512

    91086d82e0592fd248e78e433b246ad13523dc9a85fbea0deab6382e91911e4741c0da1b9b0f19a20a2186581808d4646ad3cf3bcc271895fc4bd81add5c3740

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    169KB

    MD5

    5693b5261796bda95b0abf843dfc0451

    SHA1

    52fad7b088f74203a549b79be615951dbe3268f1

    SHA256

    9a193dcf540d2fe4bd2c9e0ff463719baa0c7fe899d9c61465058bb293ff61ef

    SHA512

    474b83c4f3dd0d8aacec5022f9e84f65f062ec1f143f6742fab058e3f9e4f3bcb7ea6419259cc7e0907a8a72639acee3e4bf60c399ced3ca4a9f15bbbc8d2a33

  • memory/4788-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/4788-1956-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB