Analysis

  • max time kernel
    149s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    12/05/2024, 11:15

General

  • Target

    02ef1851af0c1988ce9bc64c2484f820_NeikiAnalytics.exe

  • Size

    128KB

  • MD5

    02ef1851af0c1988ce9bc64c2484f820

  • SHA1

    eee61dba9aa1a8186ae6c5fe685813dcf949438b

  • SHA256

    47f3febeb1fd7f914873e08e8778692135208d58f22d39184a7ea28be4dc8ba7

  • SHA512

    17e65b24e24ba6afbc9a311ec33520196f185d97648871f6c11eb7855e1505f05d534c68b3c5f40e14f78bd2504b4d467202efd43f13f5476ea738a4514ab0dd

  • SSDEEP

    768:/7BlpQpARFbh2UM/zX1vqX1v+1WbW1rjrA9ZONZOD5ZTXBvjfMfvjfMMfQsblBOK:/7ZQpApUsKiXBvzwvzXJvlwJvlA

Score
9/10

Malware Config

Signatures

  • Renames multiple (3425) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\02ef1851af0c1988ce9bc64c2484f820_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\02ef1851af0c1988ce9bc64c2484f820_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1964

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3452737119-3959686427-228443150-1000\desktop.ini.tmp

    Filesize

    129KB

    MD5

    6291c872839da80e0f4f10540c52c97c

    SHA1

    023d4ec07c543ae3d140bb192eadb3e4e7476694

    SHA256

    8e727288a3bc59cbbed571bbb9cef887362e8f5b1a37bb528d6d45c774956227

    SHA512

    cdf110a5a3387ab6321c4a2ae15804c3dcb3bdec109c29e3b18a591b14189119570f325644c1f5fcefa5199233a47e5f3b6072ba848c6a6cbf6be54d4c6c031a

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    137KB

    MD5

    addc3fb580741731eb35b7a70f46339a

    SHA1

    9e3fb81d03a65f0295bffecf86c8c0de9445907e

    SHA256

    458912c4887cfec900cc136ce86e9946085d2833ca9833147c8de83444dcc909

    SHA512

    ffe6842e6f6756111b493c7c6163dc520be5a10c245375947a2af7d3f6af35a3a8bf228204430d83eb4f3dba5d61431ce653c355ac1ae13a394bd0010af9ff52

  • memory/1964-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1964-530-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB