Analysis

  • max time kernel
    150s
  • max time network
    66s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-07-2024 04:31

General

  • Target

    35890089b47939e368a2949ba61e8c35dc21c2fd580718d92c6506d9706d0cca_NeikiAnalytics.exe

  • Size

    90KB

  • MD5

    68e913b13d50f12fd938b8cf579985e0

  • SHA1

    d6f12dc2916530aa9221ebed7ce07995f5b3e013

  • SHA256

    35890089b47939e368a2949ba61e8c35dc21c2fd580718d92c6506d9706d0cca

  • SHA512

    b454f1cf5bfe6a610f7209af21f35ea0ce8ba4a3497bedb0781b7bfce57d545d9253befddd4203e157a6c73b8c07b5a795794715cd8e514312f6d7eee77a6470

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8asUsJOVYd7n97nF:fnyiQSohsUsKY5ZF

Score
9/10

Malware Config

Signatures

  • Renames multiple (4864) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\35890089b47939e368a2949ba61e8c35dc21c2fd580718d92c6506d9706d0cca_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\35890089b47939e368a2949ba61e8c35dc21c2fd580718d92c6506d9706d0cca_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1448

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2539840389-1261165778-1087677076-1000\desktop.ini.tmp
    Filesize

    90KB

    MD5

    5ff35b6bbdff1b68c84e566d6d5f6f03

    SHA1

    2896a9931ac604c2abc3009fecf4b9ddfd71d91a

    SHA256

    be1de95a2786800af2278d0a2ce1d2ac906b81f4a329e79af0257937d8fee527

    SHA512

    328e08bae0ce34ba98faf51f0c8f84ef72385c2886e995ec6a60d8453d69c36c12f7f2281ce843677cd33f994484f832ada79cd128066e9a8b832d4809a06cc3

  • C:\Program Files\7-Zip\7-zip.dll.tmp
    Filesize

    189KB

    MD5

    0d3a2b4fa554ddeb10e0b496bc71fc40

    SHA1

    872b510a26cddf795203e2ee7267c84eeaf8b730

    SHA256

    0fa62f27e274b7935e31d036dfd6c2d0cfb97d8b6196c0b85580399f9efe5fa0

    SHA512

    7176df3fa43d4e3d83c273e792a41c09836d1dfcf284875818d9b9232b9538d6ca803d5b87e205daa0056501d37e46cc234ba1f0b891dc903bc3009c9fd34886

  • memory/1448-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/1448-1804-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB