Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-06-2024 08:31

General

  • Target

    6abe45503245f75617535b6b3af0cb50_NeikiAnalytics.exe

  • Size

    68KB

  • MD5

    6abe45503245f75617535b6b3af0cb50

  • SHA1

    efe0c9486fd3f2b7da76dac1cda6abfed5f57a39

  • SHA256

    3927d414c049e273f46d16d926b1a79f90a2b33b47c9273e63b334a47f542c59

  • SHA512

    2ae4fe19189d4f29b6b3b81dc4f2c6b5ad426912cc033a1b9d99037967198bf8e2e1c34d032f26c1a69f575c4183add7993effda5ee58a9246ab5dd083c0654d

  • SSDEEP

    768:a7BlpyqaFAK65eCv+cIA0fm7Nm0CAbLg++PJHJzIWD4adZdhAIuZAIuniXk4j:a7ZyqaFAlsr1++PJHJXFAIuZAIuz4j

Score
9/10

Malware Config

Signatures

  • Renames multiple (5262) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6abe45503245f75617535b6b3af0cb50_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\6abe45503245f75617535b6b3af0cb50_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2620

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4124900551-4068476067-3491212533-1000\desktop.ini.tmp

    Filesize

    69KB

    MD5

    f5e786d136f9d5659a59285a7d916bac

    SHA1

    29f6c6e676f4299c4ef0fb1a2b56869719bb3452

    SHA256

    b62afdb5d840be779e0a7cdb82b6869c42f7cdc8099759a570af86378a058f1d

    SHA512

    1683044d47c4154fb8572814e150746a9d41e346281885dd814f3e75f372070741fc578fb35f3bedcaed9b4a66d7835a1b57c4af62bacc1fcc70f21ffc75cafb

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    167KB

    MD5

    c51b2b117c9d3a054730270b44b83efb

    SHA1

    7fc199eb3b0ab6bca9063066db131f24489f89c2

    SHA256

    fd039d66faec2108ba5d604e34069df7c7309eef92590719c258b2b599caeb71

    SHA512

    f2170e891b2514bc898aed6b98173950ff1589be1233db92595d31f1ca134e964caccf160a1d5ccd12560ab5c9707ddaadce78ce90bc331b8b23c22c58654b89

  • memory/2620-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2620-1956-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB