Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 04:04

General

  • Target

    c842f1928e99d85aecc1a035a8906da0_NeikiAnalytics.exe

  • Size

    86KB

  • MD5

    c842f1928e99d85aecc1a035a8906da0

  • SHA1

    19a787064a0e5dbd21cef3fb6d19505426447d35

  • SHA256

    c8fcd5ade39f276589602500ffcf8258734226c7524091ef208bb62197df9e48

  • SHA512

    e61b24ea6a88e60f3722d3b1e4bf2d40afcd035c57f7f5c141f83af06cf429eab4f928036849338bf16073af0108d087e4f10ff0f6fd97dca14caa6717ba076f

  • SSDEEP

    768:W7BlpDpARFbhYQkQjjLaMaRRpi1xnRpi1xOYJIJDYJIJMFhWFhCmDpBIjsZORRec:W7ZDpApYbWj2WTWJe+e/qX7qi

Score
9/10

Malware Config

Signatures

  • Renames multiple (3432) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c842f1928e99d85aecc1a035a8906da0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\c842f1928e99d85aecc1a035a8906da0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2580

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2737914667-933161113-3798636211-1000\desktop.ini.tmp

    Filesize

    86KB

    MD5

    522b3cd4196f78757e58680d4900d7dc

    SHA1

    df2ce48a4aeee9b1233bc2ce99ed9c6223e32cf9

    SHA256

    60273d7750f50a35f82dbb0a497e55ddbfa74baa267865c2690e5d7b9a4d6e4c

    SHA512

    00b54df84d33e29eab69464645da7a8625d093b5905652f3190e4ee48e557dc49aa7f9cb572777eefdc178fdc0d7e74e3b0908975934911ccf035f52bd0726ac

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    95KB

    MD5

    7aa010ba8effa84590fe74c2f69fa05f

    SHA1

    c3a270d3aeb47e1ceb4c7041746336174ae40e97

    SHA256

    20b65431d95b0abc29c2a5b41d9d020896775e9ec1def062b6ed1ea291218de7

    SHA512

    e7375c150ede8f35dd105fcc54c0a9f47e5e7185032dd713306fc21b91634eaadf9df3409025f0e5260adc40018d4bce321cb30685a3c86af84c42ee9111ac85