Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15-05-2024 00:11

General

  • Target

    4b6c7dd19f6f630166f16d05b86cc0e0_NeikiAnalytics.exe

  • Size

    129KB

  • MD5

    4b6c7dd19f6f630166f16d05b86cc0e0

  • SHA1

    216edddc0ec08c6854458a348a3e8e8200b1db40

  • SHA256

    a6ee812e21387830b5cb0c112a3a217339295a8c1238c307db29f2db69616a8c

  • SHA512

    ef1d4283acb7b8eff67f88ad9da7226e5ebde3c70d6c2aeadf9f679f308456e87b29bb7e5e55f66d7a29186a447589db1e8ffa76b29cb9164bd4f1b03e0ea037

  • SSDEEP

    768:/7BlpQpARFbh2UM/zX1vqX1v+1WbW1rjrA9ZONZOD5ZTXB85c50KPK9:/7ZQpApUsKiX26Ka4

Score
9/10

Malware Config

Signatures

  • Renames multiple (3438) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4b6c7dd19f6f630166f16d05b86cc0e0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\4b6c7dd19f6f630166f16d05b86cc0e0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1904

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2297530677-1229052932-2803917579-1000\desktop.ini.tmp

    Filesize

    129KB

    MD5

    6a281ba8f2293cedde093f397d2cf69a

    SHA1

    ecf85871e00bd24658ffbcef994b191885e6b675

    SHA256

    fd43030ec6e463224bda524d7b46fa40f11bbaa1840372725ee3da1b2b6095cc

    SHA512

    8e548eeb128f83e629bcfa712dc4071d71da9534dd2e8ff203b4fb3f9c2b17a3a3ed7797aca74813b35311200c97db96f43277c9be1d0e70468d409493b30cdd

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    138KB

    MD5

    685cd5082478a81ad37811131c435bdd

    SHA1

    df433098a7e2b5c7184aaded2f29cacab1524a71

    SHA256

    1d2878b67b1940be8b7058d06fe9181615eaa4c55ddb27ce9e96fa45c10e91a9

    SHA512

    abe9e6de48b4e8fc14a318a5491408c855265a17ec8e5b9d9618d0984cfc491c2c3b0914db50751c6605c69c89c2a48d23eac783f4136fe3aebd53bd111e6d89

  • memory/1904-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1904-620-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB