Analysis

  • max time kernel
    150s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/05/2024, 07:46

General

  • Target

    a5bc65d3d0e0091917263a9ce2436730_NeikiAnalytics.exe

  • Size

    117KB

  • MD5

    a5bc65d3d0e0091917263a9ce2436730

  • SHA1

    d880f0342d3fc9f56e0f83b510bd4db19921b396

  • SHA256

    cb055fd7f4021b0b8ccba37114441feee87918ebb2562797b5c4b30a9c1da2b2

  • SHA512

    cedc333bce8c14e8056e5ed14ce260a2856b831c25711655bc0db49a4a780f0fcb889ff8ec3e012bcd53dab348bd5764132a4643568cd29c96cf5e51008e252f

  • SSDEEP

    3072:6e7WpHIyRF9ESWu0SWuDmhSauvEKxVTLJtxoVz8FUDrYYaCusjdEKxVTLJtxoVz7:RqlIyFESWu0SWuGSX

Score
9/10

Malware Config

Signatures

  • Renames multiple (5029) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a5bc65d3d0e0091917263a9ce2436730_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\a5bc65d3d0e0091917263a9ce2436730_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:212

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-4124900551-4068476067-3491212533-1000\desktop.ini.tmp

          Filesize

          118KB

          MD5

          acb8f045df15cf6af9e4fcbfda50e64f

          SHA1

          c9adf2b443991cdcafac82c7c8730eb45b7477c5

          SHA256

          8123f3c0bf8e7fd6dd07ea9dbede770e71b8aeab3785572bc4860e1b28732b07

          SHA512

          9213f2e985af6847612f8dd181d9f424f498a41145cf7e24e8b416c30350d5c688a26ea604c7aaf4840cb893edbe4e7da3d148977bdb79d77373f764f06c0cd5

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          216KB

          MD5

          14e18270b317282e028b387e04790f96

          SHA1

          e6ac4251b33732b974c707eacfff6e54c7c6e3bc

          SHA256

          a0c13ab70cbeda86c7a94ca124c57a0f01648aaa0cba96859d8e3b5431e2fa91

          SHA512

          65bd156acab32e39e1684ca328467ae4286f57d5ac50d87c07a5a3f683df3aa789c9a57c06d0e34d0ba4c2fb0fb61a2b32d4e255282c0737c541f0158c3a37fe