General
-
Target
c5a27f0b35fef022fcfb528c7c77beb0_NeikiAnalytics
-
Size
205KB
-
Sample
240510-mm661ahf6w
-
MD5
c5a27f0b35fef022fcfb528c7c77beb0
-
SHA1
4a402677d71ba498ab44582e93580dfc61bb8194
-
SHA256
7c310ba5fdcdf800170111a1def57c1e5ee12a07a9bc3a3423d25a0585b0dd28
-
SHA512
65b7fb81f46ff49814a56cb56deeb99d3c1ee3db540eca4a415aab973f9c116f040fff0df81eca562d63fe34afc9e449e8f073e712803b6aabe715184f9966fb
-
SSDEEP
3072:6AjRZgZnTmwEBMmul5pn9iLDOF3py0xfReEgz35lP+P/QQhCowF73:XZGniwLl5uLDOxFeEgtiQQhCowR
Static task
static1
Behavioral task
behavioral1
Sample
c5a27f0b35fef022fcfb528c7c77beb0_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
c5a27f0b35fef022fcfb528c7c77beb0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
c5a27f0b35fef022fcfb528c7c77beb0_NeikiAnalytics
-
Size
205KB
-
MD5
c5a27f0b35fef022fcfb528c7c77beb0
-
SHA1
4a402677d71ba498ab44582e93580dfc61bb8194
-
SHA256
7c310ba5fdcdf800170111a1def57c1e5ee12a07a9bc3a3423d25a0585b0dd28
-
SHA512
65b7fb81f46ff49814a56cb56deeb99d3c1ee3db540eca4a415aab973f9c116f040fff0df81eca562d63fe34afc9e449e8f073e712803b6aabe715184f9966fb
-
SSDEEP
3072:6AjRZgZnTmwEBMmul5pn9iLDOF3py0xfReEgz35lP+P/QQhCowF73:XZGniwLl5uLDOxFeEgtiQQhCowR
Score10/10-
Modifies visibility of file extensions in Explorer
-
Renames multiple (64) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1