Analysis

  • max time kernel
    150s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/05/2024, 01:48

General

  • Target

    5d3a538a0255332864dbdd02f3671e10_NeikiAnalytics.exe

  • Size

    129KB

  • MD5

    5d3a538a0255332864dbdd02f3671e10

  • SHA1

    f3df895adcb6aade06b91d4e5ef9edfceab1cb7b

  • SHA256

    c0d34aa0917452880e0fca8486ce432d4448421c1214eff7e91a489f3298e6f7

  • SHA512

    02f9774eb9f1d92e96c96dd6ba0a6d5feb39fc9a57099624f60a4c3dbe560d272f6df4f23fdf4624b8a2ae62a6853f3d4d631d5159254823f115bfdc721e7051

  • SSDEEP

    768:/7BlpQpARFbh2UM/zX1vqX1v+1WbW1rjrA9ZONZOD5ZTXBvjfMfvjfMMfQsblBOF:/7ZQpApUsKiXBvzwvzXJvlwJvl/

Score
9/10

Malware Config

Signatures

  • Renames multiple (4914) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5d3a538a0255332864dbdd02f3671e10_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\5d3a538a0255332864dbdd02f3671e10_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:4612

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2804150937-2146708401-419095071-1000\desktop.ini.tmp

    Filesize

    129KB

    MD5

    1880a383b3f661148521351a3076e547

    SHA1

    c2282ac1a6f38f43fd023afbfecbf9ad817c195b

    SHA256

    6fbab2341924e8c3e41f9a9dd524968ef4f65200c8592d359c67ecb2c063abb8

    SHA512

    be21caada3c17fe420d3e6a91234d76d5f5cba6cc55479d79285f698349befbc1f640a685c1d5902f5dceca78465dc9cf425f884605e7f9b1cdcd39ba691a78a

  • C:\Program Files\7-Zip\7-zip.dll.exe

    Filesize

    228KB

    MD5

    c90dfd6ed3d3f7363a7c01725385c65c

    SHA1

    2caa99ee059513de5e6fbb1e86c32bdc15eb172d

    SHA256

    e6477a932a6601edc976b489b41be9b0b9a1345b87457660bce51d6559d25b72

    SHA512

    d753ab744e42a0e2b02175306372d8fcdd5275e6db6ad6310f0fd5a6edbec69cd47b59116adeaa97d05ea6e950fd502a17a94c02dd9f1fac7a3697329ac3061d

  • memory/4612-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4612-1784-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB