Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-07-2024 04:37

General

  • Target

    35e2555d5c740a6564f221ac935d6558419902894521c8fb394fad93100e0a08_NeikiAnalytics.exe

  • Size

    83KB

  • MD5

    e01dcae3e48fd0e70a8711ebb7d1db60

  • SHA1

    ed216ee13cc145ae3f57532a19752b75f58107ce

  • SHA256

    35e2555d5c740a6564f221ac935d6558419902894521c8fb394fad93100e0a08

  • SHA512

    21f4a5e0d4f9fd3b2dbec87556b38b179f3490a1d33412e8b4d2de7c13b48c12bb61c382c1633aed5aa379ab434b4925987d8ee3e87a57655288ebb84820489a

  • SSDEEP

    1536:a7ZyqaFAxTWH1++PJHJXA/OsIZfzc3/Q8zx1:enaypQSos

Score
9/10

Malware Config

Signatures

  • Renames multiple (5101) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\35e2555d5c740a6564f221ac935d6558419902894521c8fb394fad93100e0a08_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\35e2555d5c740a6564f221ac935d6558419902894521c8fb394fad93100e0a08_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:3016

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4124900551-4068476067-3491212533-1000\desktop.ini.tmp
    Filesize

    84KB

    MD5

    87fa2b51c434fcdd2c62817eea0ce067

    SHA1

    b8eb5fcc125353786e161dd913793954e21a5c39

    SHA256

    82763a8edf27340e6f033e43e014e423390df5bdfeb284525bcd265d1d1d2c5c

    SHA512

    4f0b97c9552ef692ff5c796b01499cb14343e8d4054290202382010e1eeb1eed94dd27c0de478fcd6286fb7079622fbc686a1cde584beabf923991b6c650c790

  • C:\Program Files\7-Zip\7-zip.dll.tmp
    Filesize

    183KB

    MD5

    55c5bdb57ef448e91211b77ac98cc785

    SHA1

    287ab72527ade74e9fd05dc50463b5e47a6abb18

    SHA256

    540ea49159f918de8d637e0cef43fb9d46cd91c7f45175cb6ef583de73f47b9f

    SHA512

    1204cccafaa913ba3d41aad9d3f8be388a35412f8e94619e956ff9cfda864381a89aa48157b35ee948296934bc1ee7e057d43db281d1f1e958a3f802d8cfdec1

  • memory/3016-0-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB

  • memory/3016-1824-0x0000000000400000-0x000000000040B000-memory.dmp
    Filesize

    44KB