General
-
Target
2a82a8d01b2ddc18dd140c7473d2e3f0_NeikiAnalytics
-
Size
796KB
-
Sample
240510-ak4lwaaf97
-
MD5
2a82a8d01b2ddc18dd140c7473d2e3f0
-
SHA1
c176cda981e9252dbb4f651611d0a105f23c2dc9
-
SHA256
23dbff82389243685ef46c7f0a3bcb9c52806696e5d4701c7cab562891bc4619
-
SHA512
760a78b554d3f668bc211641e57a8b700ebcccb35de6f7390ae35c5dfb344cc7ff8ba1087cb13f5b47053f35561e5f2b7465b875cadda56e5eaccae97f1bae13
-
SSDEEP
24576:CgJ8cTa1yn1R6v+3Wqdd69lgJ8cTa1yn1R6v+3WqddG:rS+gi1c+GmlS+gi1c+GmU
Static task
static1
Behavioral task
behavioral1
Sample
2a82a8d01b2ddc18dd140c7473d2e3f0_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2a82a8d01b2ddc18dd140c7473d2e3f0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\HELP_RECOVER_instructions+gnq.txt
http://pp4dehh5nlkcs.pesslaugh.com/DFDD184C756560D5
http://ss7fh33dfnourebfle.geckoyao.com/DFDD184C756560D5
http://h5534bvnrnkj345.maniupulp.com/DFDD184C756560D5
http://yez2o5lwqkmlv5lc.onion/DFDD184C756560D5
Extracted
C:\Program Files\7-Zip\Lang\HELP_RECOVER_instructions+uko.txt
http://pp4dehh5nlkcs.pesslaugh.com/47DED52466F0C399
http://ss7fh33dfnourebfle.geckoyao.com/47DED52466F0C399
http://h5534bvnrnkj345.maniupulp.com/47DED52466F0C399
http://yez2o5lwqkmlv5lc.onion/47DED52466F0C399
Targets
-
-
Target
2a82a8d01b2ddc18dd140c7473d2e3f0_NeikiAnalytics
-
Size
796KB
-
MD5
2a82a8d01b2ddc18dd140c7473d2e3f0
-
SHA1
c176cda981e9252dbb4f651611d0a105f23c2dc9
-
SHA256
23dbff82389243685ef46c7f0a3bcb9c52806696e5d4701c7cab562891bc4619
-
SHA512
760a78b554d3f668bc211641e57a8b700ebcccb35de6f7390ae35c5dfb344cc7ff8ba1087cb13f5b47053f35561e5f2b7465b875cadda56e5eaccae97f1bae13
-
SSDEEP
24576:CgJ8cTa1yn1R6v+3Wqdd69lgJ8cTa1yn1R6v+3WqddG:rS+gi1c+GmlS+gi1c+GmU
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Renames multiple (431) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-