Analysis

  • max time kernel
    149s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-07-2024 04:34

General

  • Target

    35a28496c41b8cc599f5e1f1784a3415d1125a295e4ba37f28ab39e60b8d69a9_NeikiAnalytics.exe

  • Size

    54KB

  • MD5

    65512d72ed3012bd8d9470bb61c113b0

  • SHA1

    628966932d3ecf3b6eebb7244821cabfa957f0d0

  • SHA256

    35a28496c41b8cc599f5e1f1784a3415d1125a295e4ba37f28ab39e60b8d69a9

  • SHA512

    1a913f669f5a7cdfcd126938d5b781a468ccb5b46b8d9bcdbc566a6ac0225f8fa8caf8b0b25f8a5c7e648377da638165e3fae6839ac3b6f2d0b624de2b08d13b

  • SSDEEP

    1536:CTWn1++PJHJXA/OsIZfzc3/Q8zx1ev1wcw6RHR9:KQSo/1wcw6RHR9

Score
9/10

Malware Config

Signatures

  • Renames multiple (5026) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\35a28496c41b8cc599f5e1f1784a3415d1125a295e4ba37f28ab39e60b8d69a9_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\35a28496c41b8cc599f5e1f1784a3415d1125a295e4ba37f28ab39e60b8d69a9_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:748

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2447855248-390457009-3660902674-1000\desktop.ini.tmp
    Filesize

    54KB

    MD5

    95c5616dbd1056f5d360570c4a412aaa

    SHA1

    da8ffa61e2f64f695dbf9d20b7d66bf2effa6865

    SHA256

    8807b2bb57622f868b6c9d6a837edf78ba18cfd7a08aee661845a7ca3feef9d3

    SHA512

    138e6fa2db0932fb43386c70dc1199c2d81467bc91cd6e0d04f6e181d623dc0ab5b7369a7af244298afe4630b6f4b4e8f5f193cd06d43858d66aefe444df2579

  • C:\Program Files\7-Zip\7-zip.dll.tmp
    Filesize

    153KB

    MD5

    98808b655c083bebba449b523619593c

    SHA1

    f8973c6664032d3219fca6e4e298fabe232876a5

    SHA256

    f0198cc54f101b4c4fde0e1cd346bbb0e514c777f6996868b9fb3194a8737391

    SHA512

    3fdb54375950170407d0821a371baa3dffa7bfe5161a171d10c9abb672af87025ae30c6c90e02c2c9d13d3cb277f3c4a7b45d6a009b3ea230af322466aa18104

  • memory/748-0-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB

  • memory/748-1052-0x0000000000400000-0x000000000040A000-memory.dmp
    Filesize

    40KB