Analysis

  • max time kernel
    150s
  • max time network
    60s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/06/2024, 09:33

General

  • Target

    4e6eed8e4ee841df60c617d5c8b166ccf44d689c73524e444f4cdb7b804a7c66_NeikiAnalytics.exe

  • Size

    47KB

  • MD5

    aa8b77bc1b53c7b6aa9c65d289614cd0

  • SHA1

    013c06b30ac1ace87a0eb926372c333da612361e

  • SHA256

    4e6eed8e4ee841df60c617d5c8b166ccf44d689c73524e444f4cdb7b804a7c66

  • SHA512

    cc85634c2b224ed13f6718319ae6fe3716f390cd0a18247a09cc3dc72efdf898d221bc0e9349299c76cad7e692f7ed19a0a1389bf542aabbeafc1deadcdbc329

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFzo:CTWn1++PJHJXA/OsIZfzc3/Q8zxK

Score
9/10

Malware Config

Signatures

  • Renames multiple (5248) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4e6eed8e4ee841df60c617d5c8b166ccf44d689c73524e444f4cdb7b804a7c66_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\4e6eed8e4ee841df60c617d5c8b166ccf44d689c73524e444f4cdb7b804a7c66_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2272

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-4124900551-4068476067-3491212533-1000\desktop.ini.tmp

          Filesize

          48KB

          MD5

          dea93587f6469fcc7b63b0a0a75f8c71

          SHA1

          dcadab090e38f2ac653d74e17f8f413139c663f6

          SHA256

          1d362a9d0d813fd77256fd43484635c3028ca6ed1f9b738b1f920565c8cb14ce

          SHA512

          ebbdcffe4be6fafec5a021a893d8c3f481468c6dbc0bd5538013950081ec1fa522b85af59dfea1e92846a481af9afa2fe6db481d90a309800bb0ad120eb1ae90

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          146KB

          MD5

          bc8431f68402f21e68f7bb312a056721

          SHA1

          61257c4247c119f109487a37d5ea5203201c7ad9

          SHA256

          7cd54d14c6ba83859c9e8c3ac887804a9947e343f93f96788bc5f05c6c6ced24

          SHA512

          d7e501963e18de8ded28fef9131ba60764b27583727f21b82e0e416a80c5fd56721d9321e752caed284a62be6484790eb91251ea3b4482c8f09054149722db65

        • memory/2272-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2272-1216-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB