Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16/05/2024, 17:41

General

  • Target

    030996139e3c5892f63859717e3a1820_NeikiAnalytics.exe

  • Size

    81KB

  • MD5

    030996139e3c5892f63859717e3a1820

  • SHA1

    c7c09d438a99c6e94e03f0aba0fb6bc783f48945

  • SHA256

    734471f27b4e38413ab5210e13f4892b6205cb1c626fd3f2e35c577272edae09

  • SHA512

    af85de2eee0c31e032157472a05af5b63f0e97b12742a2566d035ba551be75687904c68f6c038af54552bba76eab0a8d0173426f8508f827dba609c3f7cc9b93

  • SSDEEP

    1536:W7ZhA7pApMaxB4b0CBlEVqNR7Yge+eJG/x/ejJZJe:6e7WpMaxeb0CBlEYNR73e+eKZ0ze

Score
9/10

Malware Config

Signatures

  • Renames multiple (3483) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\030996139e3c5892f63859717e3a1820_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\030996139e3c5892f63859717e3a1820_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2944

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2297530677-1229052932-2803917579-1000\desktop.ini.tmp

    Filesize

    82KB

    MD5

    9430327b17de0c24bf873aa03d6fa687

    SHA1

    778f1e02f8f9334e53125f58132dcabe8e03d61b

    SHA256

    92c92a332872cdcadab8887b6c861eeac9dbef3b270ef6a44219054a0d0a0333

    SHA512

    2c0c72f15cc637a326d6b19348f142f140c1cf66bc33b3a4d6d9441da08ec389d0fdc232d98885a31fb3938984b3b6c775314c362a5be6ec6d5aa2c947b04348

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    91KB

    MD5

    0d3a2c3bbdff9c22315d7b56fe06836f

    SHA1

    57d16c1c1907fb56b2d4aa42078b0bbd72db2f7e

    SHA256

    a20efdce8b50ef08d7e44361ca3655e4b83173f548ba279f53c27576ae17ee50

    SHA512

    207fbe2b7252ac42090e512f3eed62e6fb47b129abde7075c6cdd55ca5356f4f5ae475cfc50ba6375f23b94f1c3f2307091b7215d9ac16ab0df8def7e5109cea