Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-06-2024 00:34

General

  • Target

    942da28a926a40c27d6e6772bb7bd010_NeikiAnalytics.exe

  • Size

    81KB

  • MD5

    942da28a926a40c27d6e6772bb7bd010

  • SHA1

    d98a0cd03d8adf1ec12af937baa3fe24a65693a2

  • SHA256

    05cd9086acfa020f504d1e5bb74a5923995ebdc346fd5e45f05455c5d2ca248e

  • SHA512

    dea05c6dde84950ebe2355e3807a4b53f2eb3cdbce1cf8e5e51931d94258f0303bc8a1098175004eaba62395f60538747ba53fe3dab2c890b4f6553639a5d322

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8asUsJOw:fnyiQSohsUsZ

Score
9/10

Malware Config

Signatures

  • Renames multiple (5190) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\942da28a926a40c27d6e6772bb7bd010_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\942da28a926a40c27d6e6772bb7bd010_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:3812

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4124900551-4068476067-3491212533-1000\desktop.ini.tmp
    Filesize

    81KB

    MD5

    9d011f76caa9ced497cf50c2a4758b6a

    SHA1

    63cd771cde047608bf0597acb9982c751800493a

    SHA256

    f94ba0a27bc92dc2ec60004e5eb262558bdfc0f444b56af0a7f4f5a0e9293fc3

    SHA512

    75f3e914f9ad6ba5a2b783835ed1c1ae5458af1e717ee3171e9b8e1c3f55679c0e6b0055a0af4bc55fb661add9d08acae1790e409504fd5e3f7075131b3aebce

  • C:\Program Files\7-Zip\7-zip.dll.tmp
    Filesize

    180KB

    MD5

    4d9b71b8970bff49b20b2c5dca757246

    SHA1

    a767d152ac83f9e2bc703a537b6fee9a40a10a6a

    SHA256

    d0afd0506f5e1866a0c1831560f20faf78f54f020ea3c6e44b00d5779452745b

    SHA512

    92cd84381a7da1cd606c2208686685342070436eb1bd0cdfb5aa9d11b5a9bf6811d18b5b880c10d547b38e16c7f74d30e1c25387eff5ca948a4b61314fc20b61

  • memory/3812-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/3812-1952-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB