Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-05-2024 19:29

General

  • Target

    07b92c1fabc9edbdceb550dd4fb30e90_NeikiAnalytics.exe

  • Size

    138KB

  • MD5

    07b92c1fabc9edbdceb550dd4fb30e90

  • SHA1

    fe2918bbe2f7f08432dd45d60bfce574148136c3

  • SHA256

    471655d4c1b7207fb1219ec3cb1c187178aa6626d8ae15a4781dbee03b337f78

  • SHA512

    aabfa91fb0f55e2e4bd75c9e47af151f2dc106e75561dc4714f7b69801de6b0cc9c47ae579407f6aabdb7f4bf62d67253de404937bb893dc8db0cd95de5cf5f2

  • SSDEEP

    768:/7BlpQpARFbh2UM/zX1vqX1v+1WbW1rjrA9ZONZOD5ZTXBvjfMfvjfMMfQsblBOs:/7ZQpApUsKiXBvzwvzXJvlwJvlC

Score
9/10

Malware Config

Signatures

  • Renames multiple (4819) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\07b92c1fabc9edbdceb550dd4fb30e90_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\07b92c1fabc9edbdceb550dd4fb30e90_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1612

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-711569230-3659488422-571408806-1000\desktop.ini.tmp

    Filesize

    138KB

    MD5

    4597eb894af0fa1efae8722ad3f9e7b3

    SHA1

    a1db8e26f191e9e8f33aecd24133acbb0bfc1116

    SHA256

    4d5e1582406ccc19820f8858a38e6013677f5ced14e9ffa6155b67663fa4a464

    SHA512

    3136b4bbd66870fe034b55a4be68f6d901f95817d9523d949f8257a5013c3d7a62458db040c30a172a2cbd4cb4a1fbe233e1c3d2dd8a5bc2d9812c9dd398c627

  • C:\Program Files\7-Zip\7-zip.dll.exe

    Filesize

    237KB

    MD5

    cdd9addf6de4db7736b1a2c15510a640

    SHA1

    a0bef587170ec7a1a69c3a2f885ad480d280210c

    SHA256

    7ce9c8dbef26572d077e46fef53fbf42b208e9f5d11f03dcbc4f1baac7082d32

    SHA512

    99ec837d7837609b70aaca3c94744dc613dede5ee92a711ebe31d8b39ba09f6fd78f79409394e17d028d46acf89fb4ebdd759d74137d1a30a5dfff99baf334ad

  • memory/1612-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1612-1784-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB