Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    13/05/2024, 21:05

General

  • Target

    1a31a0df7fc7f9f2dad6e70cfc1f2270_NeikiAnalytics.exe

  • Size

    128KB

  • MD5

    1a31a0df7fc7f9f2dad6e70cfc1f2270

  • SHA1

    d0ab4aa2d1f8e297838fbeb343f1ae28aadaea78

  • SHA256

    278b30a0f56c61caffca89f4a202ea39e0ff4f7586dec0fcd5cd85684c22e6b4

  • SHA512

    9850ff2a930215e1b052ded217e31f9d7ed87ab73a1f1a4308b3fe3f0ee4b840ce41368e4bd5d32b383500ce4aae9168040f97ece4e085a2aa71b31b41900a44

  • SSDEEP

    768:/7BlpQpARFbh2UM/zX1vqX1v+1WbW1rjrA9ZONZOD5ZTXB85c50KPKX:/7ZQpApUsKiX26KaW

Score
9/10

Malware Config

Signatures

  • Renames multiple (3438) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a31a0df7fc7f9f2dad6e70cfc1f2270_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\1a31a0df7fc7f9f2dad6e70cfc1f2270_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2316

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3452737119-3959686427-228443150-1000\desktop.ini.tmp

    Filesize

    128KB

    MD5

    c31452782a794c2376239938b1de3358

    SHA1

    fe01402c7ae9bec97e52254c234d4743fbd98fc8

    SHA256

    bd13ec32828d9c700d70bc8384763a76290e1d0014d8d7d2b5e37ff9420a54d0

    SHA512

    86438ab9bbb37578dd3dde5ae28ea37431e7ec68fccb0c7939a559a88c8ea3a33570b41feaa6103a2ebe1da9d1526f4df447aa49025d4cc86e8168ae6314980f

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    137KB

    MD5

    458b1071c7cd78c2f67247a8a5f956f5

    SHA1

    5857bdc3054f5239c7f709e830ce3b796b6ad59c

    SHA256

    a60b92ae013080e46940523ce32f298ed0248548b1c063dbeaddb6fa991a86fe

    SHA512

    01c5e83af8d2293a4d9bd58e92140f160d07a8357ae5b3098a4bb5d6b0dc5d72ba4a021e217569aa4bdad95c39864c700349c7f39d99040ab44c29d6c8523224

  • memory/2316-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2316-644-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB