Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 22:11

General

  • Target

    48fe4392584ad4f413a3a2d619c9e8f0_NeikiAnalytics.exe

  • Size

    134KB

  • MD5

    48fe4392584ad4f413a3a2d619c9e8f0

  • SHA1

    683f4cac0e36b6b79127066c2101e8b0d6c74680

  • SHA256

    217f1933a34558422f7df30ef6f030e044215846eb91ebed1fa0113b23db8fa1

  • SHA512

    41f3aff7c96771af349277c57b6855475f8b1a455400541af47e2c439ef6c394bd43b0197bb923242601fa58f270be9f1fefda94ac79c1a5ea3e5d8973ab110e

  • SSDEEP

    768:/7BlpQpARFbh2UM/zX1vqX1v+1WbW1rjrA9ZONZOD5ZTXB85c5cfYf7WI:/7ZQpApUsKiX26rWI

Score
9/10

Malware Config

Signatures

  • Renames multiple (4675) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\48fe4392584ad4f413a3a2d619c9e8f0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\48fe4392584ad4f413a3a2d619c9e8f0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:4772

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3571316656-3665257725-2415531812-1000\desktop.ini.tmp
    Filesize

    134KB

    MD5

    48223386920a0b8fed71afa0bd978b32

    SHA1

    bb09ab47a865cd90a11177802e731696c0bef8a4

    SHA256

    486110448ad91193be005df8b8301b34693f9293ba81af06cde0e4f3f348d9aa

    SHA512

    a6de17f5ace08e25a5d463313e7896382bd4d133b4dfd1180be14aca3dff3d9221d10d849aeaf5559780f895287238906163069191d4ef619cd0c2560951a024

  • C:\Program Files\7-Zip\7-zip.dll.tmp
    Filesize

    233KB

    MD5

    53b60f3412834ae352721d8c932749ff

    SHA1

    4e10899a336c68ba33e7b10a04e0f154dabee4ff

    SHA256

    1af34329ae66e4bc97562d7cd37f3463df772046a0ff8be7173a692dae1c0d43

    SHA512

    ff26c6e6f91b92f389db1ce3f10a0b4830f70f702c3bbd8830fddc69eb6c204b1c623affab216976072a56f355d70b2b813ccfb6c449adaa3663627037fa1878

  • memory/4772-0-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/4772-1590-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB