Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 03:32

General

  • Target

    836e73df4ba03fd378a305b819b9a600_NeikiAnalytics.exe

  • Size

    134KB

  • MD5

    836e73df4ba03fd378a305b819b9a600

  • SHA1

    d57dc1b9502368940c059d99ce76e2655dae3f08

  • SHA256

    762eef14f01f45f0ceb236471ad23addd8182f2794c445c4ed2235549a77c469

  • SHA512

    287970f85cf7191c2c2bfeb89b1c36618318ef3e93314cc6f147a5dd325b0f140927f5ea7decafbd2eda1f495cbd4d57136147de9072a8f2aa64300da1bc96cc

  • SSDEEP

    768:/7BlpQpARFbh2UM/zX1vqX1v+1WbW1rjrA9ZONZOD5ZTXB85c5cfYfVS6D:/7ZQpApUsKiX26R

Score
9/10

Malware Config

Signatures

  • Renames multiple (3224) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\836e73df4ba03fd378a305b819b9a600_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\836e73df4ba03fd378a305b819b9a600_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2368

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3627615824-4061627003-3019543961-1000\desktop.ini.tmp
    Filesize

    134KB

    MD5

    806274639e47550b4c9d0baf79318be7

    SHA1

    1e0193406198f6f051ad71938cbcfcff6f16d60c

    SHA256

    d21214e68585c31c249595ce76512c65ea654c14752fd8f0eb3cc738e788945d

    SHA512

    faa6e1d4eb7dd4d7a18230d9bc1b819ef505edd4016e0c63610c9baf2e795da31c3ffccda61cac4c01703ef7ca7701f8afc9bf70aac69734ef0b39430a49a46b

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    143KB

    MD5

    dba3cc711aadb2a973c7a0a0a92d9a78

    SHA1

    a5708dbbdebca07af10a1f807e210af83943e2aa

    SHA256

    3e261f49a0e4cddd70d69b70143b944492e2d5553af82a2d7283f48d7f4f3fe6

    SHA512

    bcaa7fe742bc27182ebd8c1ad171de93cf8c5e5cd89cb4c021b2da5fe9526b9c5dcfaa61d96e49a7f414e1dbb0e4eceae6d977a7830265d5fd4e39e3e667a49e

  • memory/2368-0-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/2368-394-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB