Analysis

  • max time kernel
    149s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-06-2024 22:28

General

  • Target

    273c46466c21b6d15e8a2caaa7afac35198b0e3a6da7938f3fe5155705f15aa8_NeikiAnalytics.exe

  • Size

    96KB

  • MD5

    3158adea5922ec16506640c8c04832c0

  • SHA1

    086963068e95334321f28be2af04ef697dcc997d

  • SHA256

    273c46466c21b6d15e8a2caaa7afac35198b0e3a6da7938f3fe5155705f15aa8

  • SHA512

    00c4ea7399c2cb30651ff9753b6dc3fc0c3cd61b1002a2dcf39ae2e0b23752e289776d9d6a8f17b5eafc80d7fdd5a78d43c6dfba41fdaff6fb011b9c918fcd06

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8zxtjm8sH:fnyiQSoojmHH

Score
9/10

Malware Config

Signatures

  • Renames multiple (4814) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\273c46466c21b6d15e8a2caaa7afac35198b0e3a6da7938f3fe5155705f15aa8_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\273c46466c21b6d15e8a2caaa7afac35198b0e3a6da7938f3fe5155705f15aa8_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2664

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4124900551-4068476067-3491212533-1000\desktop.ini.tmp

    Filesize

    96KB

    MD5

    4149703703a0af842c0da7505647a327

    SHA1

    6aaaff96f56d8ecde8b5c07d273d345731c785a4

    SHA256

    a5ff31e42264c199450045e8fa074d70f141d64872a839818d434a5747cf4eb8

    SHA512

    1949cb6c951100f153c8e4ac5205cc9725a4792793bdaa6c06b4b0e0f112653efe442b6966f2c46d0585ca848b679505d18884e484ec37051efd7e548ddc226f

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    195KB

    MD5

    c315c200688402c092aca454eaaa0d67

    SHA1

    8132414e1bbbee88c666de0d6602caf15f7adc09

    SHA256

    032098e31d6b521878240e5d407134ca18b923a18262066c967c3ce412a470d2

    SHA512

    1d7a9eb8606f05520f205218bb2ccb55f5e07e97e40c47747b4e8a1e253b683ad5ce90c266075b9952b7b064b90a223e61659dc62fd2601c6a14eb561fbf0749

  • memory/2664-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2664-1776-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB