Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-07-2024 04:33

General

  • Target

    359fde4cdc2a92e579f8a22b78dd6fa31cae93110ae319f906ef5813004d9914_NeikiAnalytics.exe

  • Size

    63KB

  • MD5

    9196d88e111152442bc51e81cf0cb400

  • SHA1

    eb7a6b76399932d79dab1db5c1864c8b21c9392e

  • SHA256

    359fde4cdc2a92e579f8a22b78dd6fa31cae93110ae319f906ef5813004d9914

  • SHA512

    dfc8a017893fefed5b081dbbaad4a4f36e1343c8c617c46cee4b55f2ae56477431e68dda08ff467d86c6266e1d2079ba53f54d3fbd7b30aab0774134fd5a8f4c

  • SSDEEP

    1536:CTWn1++PJHJXA/OsIZfzc3/Q8asUsJOLKlD5:KQSohsUsUKlD5

Score
9/10

Malware Config

Signatures

  • Renames multiple (4824) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\359fde4cdc2a92e579f8a22b78dd6fa31cae93110ae319f906ef5813004d9914_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\359fde4cdc2a92e579f8a22b78dd6fa31cae93110ae319f906ef5813004d9914_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2580

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2080292272-204036150-2159171770-1000\desktop.ini.tmp
    Filesize

    64KB

    MD5

    e3c4bd095656860aa8d368e964187ddb

    SHA1

    49de608a56547cb28b8acc9769255f39d898158a

    SHA256

    b29653194c098d75832959031d220772c584d0b10d482753abd9bdd70d7dc18f

    SHA512

    0559da60a24d7b344430e491359449deafe89a83b57c2b8855e42366e9f8c80514c14b28f14da1a6ecb3757b5243710a68f34d78115da8ee3d3ab4b5aa4d1ce4

  • C:\Program Files\7-Zip\7-zip.dll.tmp
    Filesize

    162KB

    MD5

    9784193eba015a01e2e4162309786d0b

    SHA1

    96751e3e1da89beb87c5683a366ca6faa4980f24

    SHA256

    cc432278e4786f86324a86207c708f702dc06075806437aa6ab25615903abbc6

    SHA512

    d5eb3b71384f5f4d1029718cc18e4d4de4b3ce462c4862f66da12f9cb4ecd15d1f93fb80173c147546ec2ece47ab50fe49815d23877fb13e0ce44182c461d024

  • memory/2580-0-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/2580-978-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB