Analysis

  • max time kernel
    9s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-07-2024 03:53

General

  • Target

    33684bf4eb22f746a438350fb5537d265775c20db942286f0f9a88b8fcaeb627_NeikiAnalytics.exe

  • Size

    100KB

  • MD5

    411e0123eca157aced8555a6b9965d70

  • SHA1

    2c0591329eae77a4e2b653ded99be7bcb7a67146

  • SHA256

    33684bf4eb22f746a438350fb5537d265775c20db942286f0f9a88b8fcaeb627

  • SHA512

    9ae588884fc82e4ed1463536b88f7689eb26713dca7d281cce861680a6650ad0152e30132169336f38671edc06b6bd62aea753069e06453b747c02f432dcf7c0

  • SSDEEP

    1536:V7Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8asUsJOVYd7n97ndJA/fqJA/fVyayI:fnyiQSohsUsKY5ZhpI

Score
9/10

Malware Config

Signatures

  • Renames multiple (221) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\33684bf4eb22f746a438350fb5537d265775c20db942286f0f9a88b8fcaeb627_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\33684bf4eb22f746a438350fb5537d265775c20db942286f0f9a88b8fcaeb627_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:4036
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4456,i,15142778360084620907,1763097090506261076,262144 --variations-seed-version --mojo-platform-channel-handle=4376 /prefetch:8
    1⤵
      PID:4440

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-1181767204-2009306918-3718769404-1000\desktop.ini.tmp
      Filesize

      100KB

      MD5

      9d7514647c4b7aa96c44051b14ccc2e4

      SHA1

      49d3ce6779cc3d469c52f08483d836bfee76e400

      SHA256

      db430d63b4eb3ef50e7cacf81129b2301ab85639fe78f4dd22b24bc42a6f4289

      SHA512

      b742d15d50bbe0fbfecd88a11207c9eb33884fcd83e2a74daee339cbeef8c94aa2d5dfcb980f45fcaa807fa2435193d85aac6cc503cd2a9cf47f43fe5d48892f

    • C:\Program Files\7-Zip\7-zip.chm.tmp
      Filesize

      212KB

      MD5

      00d7b38ea4693eaca2e9559d535dd25e

      SHA1

      dbd3957f393a1eb0b85bd193cc72e4e4dd805809

      SHA256

      1348b828adf7f722df2f0fc3ea68606d34a5f9ccc47c4cf7dc164c47207eebf4

      SHA512

      904290416926528181f57bee45130eca15b14830e3bcdf3f850026d61028f3f5b0483c70cfd778705c2029e71863b83115f6d947d9e716f167e1292834cd6563

    • memory/4036-0-0x0000000000400000-0x000000000040B000-memory.dmp
      Filesize

      44KB

    • memory/4036-1592-0x0000000000400000-0x000000000040B000-memory.dmp
      Filesize

      44KB