Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/06/2024, 15:04

General

  • Target

    852840ea2e268bca2691161602190c807fd65e60360400f34a7520693633976b_NeikiAnalytics.exe

  • Size

    73KB

  • MD5

    060a7a498300c99aa6de2bb858391f40

  • SHA1

    72559efd5811b236eb0ce39a5475b2af50f5add5

  • SHA256

    852840ea2e268bca2691161602190c807fd65e60360400f34a7520693633976b

  • SHA512

    496a988d93dbf65eb17870111c5a75d94d961acc6f2de0edf002e843844de68b52030f715569cb6e9df72ac3555749d939f53165853cd4fc035693e9ae928f4d

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8IZO:fnyiQSo7ZO

Score
9/10

Malware Config

Signatures

  • Renames multiple (5210) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\852840ea2e268bca2691161602190c807fd65e60360400f34a7520693633976b_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\852840ea2e268bca2691161602190c807fd65e60360400f34a7520693633976b_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:4924

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3558294865-3673844354-2255444939-1000\desktop.ini.tmp

    Filesize

    74KB

    MD5

    d4b32df891af181d2a50c0ce21434f41

    SHA1

    38bb1a9a9d59fa9ee834926c34e97cb36d2e8f6b

    SHA256

    7678707045ba93afc3b9bf14846629a48e03ab632fa4473ea0537e2b4d483ddd

    SHA512

    96f83fb484e0181e3a398eee9178e5f450a18f47a8769cc494cfe9c72026d1116143335f2393d68f898e101b2f02792589719c77e94f3345698f23c540033436

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    172KB

    MD5

    bbeefefd80c861ba655119a4d66ee06d

    SHA1

    cef25be34bb1553382ab12c1059ce2160919ae58

    SHA256

    0e762e6472a47638af5d54ef0c7d9bfeb3ce957e1c6f2cc073a65153a7ba10dd

    SHA512

    964b89f8dbed3cde2fd56c36d0bb882c95821053e51ec5a876296dbfe4736b9482fdff16ef54b738c58331f2ebdec3dc8e61917936ea1e6df9d9dc96b1343aa7

  • memory/4924-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/4924-1954-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB