Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    21-05-2024 19:29

General

  • Target

    07b92c1fabc9edbdceb550dd4fb30e90_NeikiAnalytics.exe

  • Size

    138KB

  • MD5

    07b92c1fabc9edbdceb550dd4fb30e90

  • SHA1

    fe2918bbe2f7f08432dd45d60bfce574148136c3

  • SHA256

    471655d4c1b7207fb1219ec3cb1c187178aa6626d8ae15a4781dbee03b337f78

  • SHA512

    aabfa91fb0f55e2e4bd75c9e47af151f2dc106e75561dc4714f7b69801de6b0cc9c47ae579407f6aabdb7f4bf62d67253de404937bb893dc8db0cd95de5cf5f2

  • SSDEEP

    768:/7BlpQpARFbh2UM/zX1vqX1v+1WbW1rjrA9ZONZOD5ZTXBvjfMfvjfMMfQsblBOs:/7ZQpApUsKiXBvzwvzXJvlwJvlC

Score
9/10

Malware Config

Signatures

  • Renames multiple (3434) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\07b92c1fabc9edbdceb550dd4fb30e90_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\07b92c1fabc9edbdceb550dd4fb30e90_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2184

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3452737119-3959686427-228443150-1000\desktop.ini.tmp

    Filesize

    138KB

    MD5

    1edf5fd5ac4f6a459eea68eb5b3516c3

    SHA1

    bf7750226571b34b3c06d289b58a90e8fe59e420

    SHA256

    d0814cc5e51f920c679b942d34b8e8f71446d317c284e457a7f5e4b0657a76dd

    SHA512

    9df5d434c84d3c13cb4966cb0988bce710d0febbe2b92b28786a671f51a7d1cb17711d5ea3046c0c859d2b0baa92364fcd8eff8aa55607076e14bc24b79ade02

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    147KB

    MD5

    a211d3f1032a63842360d426ecb33dbc

    SHA1

    d31776a1b0f5d0f6da4d630225dfb1418f145f25

    SHA256

    f5255d40df22c7d76016ef98b20d0a68056572e39c7a384c4b97a3e700224a15

    SHA512

    7acd0539ea1920fbe1c2714c3b2f3cf92ec25bd62f77e2ebd9487e84a4839f0f42d35e8e1b2b1f268827725634814efd4a79f61539a571fe5caa676ce7d82093

  • memory/2184-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2184-640-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB