Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    15/05/2024, 19:39

General

  • Target

    221799b8d68f7e7702945d5448db2550_NeikiAnalytics.exe

  • Size

    129KB

  • MD5

    221799b8d68f7e7702945d5448db2550

  • SHA1

    a65bd425f68c0d2bcde0d1f9e96736d25290cc44

  • SHA256

    f1385d1fd8f47b3743d91cf27f933b52e7e261d6a71084e033b2863a2474a46f

  • SHA512

    f520c9173ed7a2825406640f1c1b2487cfd8d1619dfe41d1217db18dbeadda9a21475f19db5d55f47b0a486b37d86f80c72311aaccbc61449e249b2f525d8b33

  • SSDEEP

    768:/7BlpQpARFbh2UM/zX1vqX1v+1WbW1rjrA9ZONZOD5ZTXB85c5jKn:/7ZQpApUsKiX265m

Score
9/10

Malware Config

Signatures

  • Renames multiple (3451) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\221799b8d68f7e7702945d5448db2550_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\221799b8d68f7e7702945d5448db2550_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2916

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-268080393-3149932598-1824759070-1000\desktop.ini.tmp

    Filesize

    129KB

    MD5

    609948ffb92b988f0c94937059c8dab6

    SHA1

    a7d296a0f1347a1a6b0038f74b936cb7fc0d5a76

    SHA256

    8a9bb4fbfea823da5aa54042f71f99b2f821b2c33b15779328ce48266c25f0f6

    SHA512

    b308e311dc4cbde1421d11ccbbaa7ee37e871e184c60ab887364cc42fadc0922abb6bd0b41e4c9ace7dfdf21d790e34153843b0057edba5437bc3f121d0cb234

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    138KB

    MD5

    55c01c896d340c24a6dea1172d9cad56

    SHA1

    8704bb3bab8102268a7c60530c9b1240911347ed

    SHA256

    cd90e41df589e5271e22cd72ebd07b71404635b47ad17b8e3afb556bb891df01

    SHA512

    de236e2629e9614c9402cb539161e6878f3c4430d6022a19b5ee7ec2f6a1a808ccdce9477b2fb26d0893a71df3767e06e7b60f16efad9dc566c4d3d26dc1a431

  • memory/2916-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2916-534-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB