Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/06/2024, 13:12

General

  • Target

    7edc3199849b29355eef78b888cea3e0_NeikiAnalytics.exe

  • Size

    86KB

  • MD5

    7edc3199849b29355eef78b888cea3e0

  • SHA1

    507c7326acb6145a7787e7dbc181a5e6d37d4b87

  • SHA256

    b611055df5d5a145aea58c9dc9df9595d6e1c1618d76c4934f89b5b035942416

  • SHA512

    17418557fa7938c3321bb73ae1772932b530c76abce73d492cdf6d15d431581e3af9729178529541bce6a1782b6ee9cd127d70b15cf80187891b35a5d35b600c

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8asUsJO9frfD:fnyiQSohsUsGzL

Score
9/10

Malware Config

Signatures

  • Renames multiple (5204) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7edc3199849b29355eef78b888cea3e0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\7edc3199849b29355eef78b888cea3e0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2412

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-4124900551-4068476067-3491212533-1000\desktop.ini.tmp

          Filesize

          86KB

          MD5

          617dcd89a96abb786e59801a81225b64

          SHA1

          ff6b8a4d7203f50be1f91e48dc6e556f48c1d60b

          SHA256

          073881fde4e6b875d27c4c54494cf661546adac3d62a16bd823a94b7b5c51317

          SHA512

          47f02edbe45c765a7c984bbb6c9e18baaf005b90b452a63745736b808686cec77b752f7ffdcb937b8d0c8c4d05649814bf2d7fbea9bbf7a5e50f23ec085c1241

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          185KB

          MD5

          7b51694e8531627c3bfb692c736c8048

          SHA1

          c135d32a9d677a34d118a5a1956234a3e712d244

          SHA256

          b7e20278dcf784102e9bf8cc33846e6a4e62787acf8fad24a05f0c06378f4799

          SHA512

          3c4cee9630551c254bfb8e236f88b6d041a46a370a14a6b8600fec4dcb5a7e4119255169b9178e967dfe1b01ec539d8c1afc5bd0400ac7f6d11d44d78c8f5a08

        • memory/2412-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/2412-1964-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB