Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 16:38

General

  • Target

    51ead86d9a8f288d0d85bbb592584e40_NeikiAnalytics.exe

  • Size

    84KB

  • MD5

    51ead86d9a8f288d0d85bbb592584e40

  • SHA1

    56b7acf2290af276fe0ffb475b4f04e0bdebe037

  • SHA256

    c9737534c0fc23d3d6ef5068676f193c3b4e63eab65cb86de6fa6cf6324b9cef

  • SHA512

    426c3c4557490ad095b5aa6f1d7cfc9d13bb5f770fb771f88b4384f6a37fa7a134a14b79853787a63965c6b8907981e2442b06f83ee7ce49db9de855cbc4ab88

  • SSDEEP

    1536:W7ZhA7pApMaxB4b0CYJ97lEVqNR7Yge+eJG/x/0VXaW:6e7WpMaxeb0CYJ97lEYNR73e+eKZ0VXL

Score
9/10

Malware Config

Signatures

  • Renames multiple (3505) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\51ead86d9a8f288d0d85bbb592584e40_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\51ead86d9a8f288d0d85bbb592584e40_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2040

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2721934792-624042501-2768869379-1000\desktop.ini.tmp
    Filesize

    85KB

    MD5

    ed576e01acc8ed49f4db8bcb9a57ed92

    SHA1

    33f7ba9ba9f71de8b957ec623906362ff41e565a

    SHA256

    1a4f575cc1aaa92f2aa185739a27feef0d35cb87eb0eb6d59e31fe37fcdd1d66

    SHA512

    08736f3a971b2490a3983ab0f7c1937c47dd4fc2071f747644c8c9588df9c13a9d1ffc3ce8b3873d9516886eb1de6a8c4008432b9c021b9b47bade60a1ca3200

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    93KB

    MD5

    7e1380c3b11ed7f0176e2acf4cc556c6

    SHA1

    339ebb998cfb5511bee50c10708e238ba13bd32c

    SHA256

    e3510ca25f49b5a38ae008c514c4028842204270f3b4da61be3f7e4720812f44

    SHA512

    0d94cf3f03b40efaf0b1ef35aece2e4b6159145d60067f9a37a045f4270f0f76eeb82acc803095b2131b8901eab3642c5af3f06fa4821509fb64fb29550514b6