Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-06-2024 11:40

General

  • Target

    6cdea9b30d1e472b837b098517b3ea55138ad590d04ca8c69c91b82732fcfadc_NeikiAnalytics.exe

  • Size

    92KB

  • MD5

    57c8dadaf65e7120f3f4a53e34f60900

  • SHA1

    fee5e0afcfebe6ca5c321f8d62009eb91398c924

  • SHA256

    6cdea9b30d1e472b837b098517b3ea55138ad590d04ca8c69c91b82732fcfadc

  • SHA512

    b52f55423bc5674a6ea601302817eb41fc44b520398163c54e34c862a0f9411401fbc87ff06bc7e28b3e62e754e828ca8aeb3a68a2c65d4d1c947302faee64cc

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8zxSL/5:fnyiQSo5L/5

Score
9/10

Malware Config

Signatures

  • Renames multiple (5086) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6cdea9b30d1e472b837b098517b3ea55138ad590d04ca8c69c91b82732fcfadc_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\6cdea9b30d1e472b837b098517b3ea55138ad590d04ca8c69c91b82732fcfadc_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2164

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2080292272-204036150-2159171770-1000\desktop.ini.tmp

    Filesize

    93KB

    MD5

    d02120f2c252f834325b090950c6e144

    SHA1

    0c429387962cd4cbff087e2cd9a4d21af7896d5a

    SHA256

    14aad4d85faaada0b07dda1ffc0536c3f90d5f1a32bcb39e8b2cb47990f3990f

    SHA512

    840b0602935269ab7ca77fcfc52bc6d99033e7239c07c6601bc7336a1d008829a2e74a654c591f95dac18bf79f1680afd7afc7d3dde24f4043da7e379e36f2b3

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    191KB

    MD5

    b47d169be8ede85a57f0c03670b7eb03

    SHA1

    dc10f6668ae660cec9bef3dcceaf44110b5be091

    SHA256

    6141765f4730937193255e7833b7375774499f069bcbee92c2631a74c38ca5dc

    SHA512

    df1ca5f7d6e66fe8f8596c4454edf2234f10f83faca908dd956aaec5eb1fad26f53965423f198a26214c0db8aa2d34354055089e78e74b85263ce4e3a42bd811

  • memory/2164-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2164-1886-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB