Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-06-2024 04:49

General

  • Target

    4f0bea45d28c0b59e9658317322c09f95e265b1f7702a5774dfa33084f7a6c37_NeikiAnalytics.exe

  • Size

    46KB

  • MD5

    c8b8305205989d38c24a245a0fdbc9e0

  • SHA1

    4390eccd63af0e791115bc093ef45b51b7b066b3

  • SHA256

    4f0bea45d28c0b59e9658317322c09f95e265b1f7702a5774dfa33084f7a6c37

  • SHA512

    9537602d47397aa2ce927e1f455add6340544407e786b29434a7a1037994352c8b73f0a64e11ad5af59aef454fd967a2412fa466425c9795e99478028d7b1532

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFzC:CTWn1++PJHJXA/OsIZfzc3/Q8zxM

Score
9/10

Malware Config

Signatures

  • Renames multiple (5353) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4f0bea45d28c0b59e9658317322c09f95e265b1f7702a5774dfa33084f7a6c37_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\4f0bea45d28c0b59e9658317322c09f95e265b1f7702a5774dfa33084f7a6c37_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:4736

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4124900551-4068476067-3491212533-1000\desktop.ini.tmp

    Filesize

    46KB

    MD5

    e60a1cdff0a04d4ced86975f5dbb0793

    SHA1

    396abc83bb52c4f20d1a81998a92a39258c51116

    SHA256

    57174ecd986d399277c06476f86ce9a1368cfecf5eeefbbf6d1850f124579923

    SHA512

    acb44a0f41a0da26fab0b9444bdced1f74334ee40599c1f720d5c88bffec36aef59fffc6994b3898066471259e20d4eff1ab72d2c615b16eae307d202c8c750d

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    145KB

    MD5

    05a5f03502aa667ff17c7fddf4f292f8

    SHA1

    b8cab7692ebcfedea3c63cf8750ffbd7d13584c4

    SHA256

    09b5a8a98d4e2b58350e2b15d850ca2e00e4588b7d6afb2e53c4a536b69eea9e

    SHA512

    33c17226b0f834859c5508c7fd3d1d515d1c4a1ae580e909eb55e34356087b811a12836f417e6f12acc6488910b74c13573dc20b4cb6f6c7f37df8a02fda560b

  • memory/4736-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/4736-1216-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB