Analysis

  • max time kernel
    150s
  • max time network
    51s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-06-2024 12:27

General

  • Target

    720442f709d6f05939c6054e51f657a63f6d86b59d8bc8f2474957b9ac1d7e28_NeikiAnalytics.exe

  • Size

    71KB

  • MD5

    66fceea28f5ae1b00cc10ddc6166ac60

  • SHA1

    9d7825e6842bc99cbf9ec96c577b75f4511770cc

  • SHA256

    720442f709d6f05939c6054e51f657a63f6d86b59d8bc8f2474957b9ac1d7e28

  • SHA512

    2436ad97eced9a9e74bae4fcb2f1fd86f670b6d2e75222a158351e729d9ab9f75cca2576f787d49e35f48b1976cf66ac59e65bdfc80ce96c4d838cea6c127f2c

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8IZN:fnyiQSo7ZN

Score
9/10

Malware Config

Signatures

  • Renames multiple (5217) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\720442f709d6f05939c6054e51f657a63f6d86b59d8bc8f2474957b9ac1d7e28_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\720442f709d6f05939c6054e51f657a63f6d86b59d8bc8f2474957b9ac1d7e28_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:3632

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1337824034-2731376981-3755436523-1000\desktop.ini.tmp

    Filesize

    71KB

    MD5

    6340910b16bc40201c7b935d66535bd7

    SHA1

    93d1eaa4225429dd2292f1206ee5182a5cf876b1

    SHA256

    4461b63670ff5c48ae5b3e74653032a67cca635f9fa44fdbd77ee9ad1c28335b

    SHA512

    4a91e07c73ea3f1a36987eb0c78281a07fb4fca84b6ce67f62a76a4f24c4d3bd375caae9a27581f3ff324ced6f73ff6924521f532f46db62dee6bd9d5c77f2c3

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    170KB

    MD5

    5dd0df1285110c9975af471766f8d81d

    SHA1

    e9fc8638a5abfc974310395a8a0b36c5c6ee65fd

    SHA256

    a7ad76c60bae0393e69093889e1fdc2a4891f125d3de20641f8b6cc34cede7d2

    SHA512

    7fd931d126b6366ccaba7ba220403caf43adab1e32600b21a2342035cc6c0efe6a71339323865e5cb74d7888887d357d1fc381ee73ac376412e1ae0044ef3d8f

  • memory/3632-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3632-1956-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB