Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 01:32

General

  • Target

    1376ac98b4e42818edd380d19d00abe0_NeikiAnalytics.exe

  • Size

    89KB

  • MD5

    1376ac98b4e42818edd380d19d00abe0

  • SHA1

    5eaac5ac1db70f7e31bfa928c015c70be859e48b

  • SHA256

    a5faaa2e0addc2c5d0f83e7347946a07c1f62f29322333eb03eac476df31b089

  • SHA512

    13209a9e0cff6f7a0f0f774fb09433fd93b1083ba513649c86b8052d2f7158bf51727b8498cd5ad3db6809ac931b538f6d291a6010e42acb1d8b1484aa7659c8

  • SSDEEP

    1536:W7ZhA7pApMaxB4b0CYJ97lEVqNR7Yge+eJG/x/7uH9uHpvGRvG3:6e7WpMaxeb0CYJ97lEYNR73e+eKZ7udi

Score
9/10

Malware Config

Signatures

  • Renames multiple (5134) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1376ac98b4e42818edd380d19d00abe0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\1376ac98b4e42818edd380d19d00abe0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:904

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4124900551-4068476067-3491212533-1000\desktop.ini.tmp

    Filesize

    89KB

    MD5

    c03126b145034fce745def3016c85442

    SHA1

    9f0d1645852e15833b12853c0a463f6f81762a63

    SHA256

    09f051c29f422f96c298b3c08793249c83bdfead01fea81f370401a4b9dd713c

    SHA512

    67ff8ca8c69d861525dfcde23247f9a49d5acea8087b8d72609c176cd4e0666b07c04cd2141bea98ac0353f313c3db6bc77005aa9b24ea6312e2852e35909b4b

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    188KB

    MD5

    28e689432bc573478eec9a2411bcb650

    SHA1

    cb5b908be94e57cc79ca2a5b5311c5a4e3d9a103

    SHA256

    9d72a032be91d01387884aeec093b9ec3d61ec74a75f3191c5c2f91ee4670281

    SHA512

    5c0ac103f2f4f4ba697de2262ff8ff09ad0f3fd7325de00abdf474a8c1e554d8b72fe2807c05d54ff746bf973accc889b182fe5b942deaf79c9e9c2a46e706e4