Analysis

  • max time kernel
    150s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/06/2024, 09:06

General

  • Target

    5ba12fbf0d7d1e3da743605b97735488350489b979c5ff221e7f68d767aa33e7_NeikiAnalytics.exe

  • Size

    80KB

  • MD5

    d2559c85eef55d10438108d6ba4165a0

  • SHA1

    e94df08f1851a579e0eeb439913dc6d9df5b8c0f

  • SHA256

    5ba12fbf0d7d1e3da743605b97735488350489b979c5ff221e7f68d767aa33e7

  • SHA512

    ce31b6e2f19ddacd636f820161db04ab92aefdaab15bd70f70edeec3a50a22f64dbe9e59ee1152aaa6054e8fc29080790172b1a4416a42f7f0273b920eebec06

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8zxq:fnyiQSoj

Score
9/10

Malware Config

Signatures

  • Renames multiple (5040) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5ba12fbf0d7d1e3da743605b97735488350489b979c5ff221e7f68d767aa33e7_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\5ba12fbf0d7d1e3da743605b97735488350489b979c5ff221e7f68d767aa33e7_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1200

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4204450073-1267028356-951339405-1000\desktop.ini.tmp

    Filesize

    81KB

    MD5

    5b3a226f17fdc62391478b64763a54b6

    SHA1

    846555a1d4f43de0ef2565fa71915b7e293af54c

    SHA256

    226a0b1e330a2f426e7af54cc9156f9104e5c1a9519246dc84f39466f69f71ba

    SHA512

    dafd48b90a1f4a3db039bd2db756ea89f2fc03d1c23cedcbaeff723f24168b589d0e1de241923ad3b806002e93cb16fd9f5aa4ea06f1e85d2172c3157b3e17bf

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    179KB

    MD5

    ba5ccc9bcbbdaab7165e7c962aa70443

    SHA1

    2fed84b313e563a7ef2cfb8073e1320d7784a070

    SHA256

    fefcbafbc24c8a303f57b5d68ed8be40f969fcd0fd05d94361c370ec75588678

    SHA512

    64367a0e4a57f518c36d6674dc8e8027762789c99654c16e1f0934afea9a2dd9ff816f4189816743f12e6b5b0879213bf1340a82ef249630db07f652f5e9f811

  • memory/1200-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1200-1886-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB