Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 17:11

General

  • Target

    54ae4d51981ee0666dbb9c237c4433c0_NeikiAnalytics.exe

  • Size

    84KB

  • MD5

    54ae4d51981ee0666dbb9c237c4433c0

  • SHA1

    d336b2e8409ab3c2509120f6e3aef287332aa44b

  • SHA256

    d782cbf88c480564a5ebc1ee2b99e2cb946ed73410805620afe516af9d2fb923

  • SHA512

    21ec1a8caf00cf5d4321d7eeac675e6d2089fdfc3fbd49b03f1c207b90b26a32913cfa1b624086df4c6b0fff52908c3c628ad9b590d75d2f13d4d0c203aa4bf4

  • SSDEEP

    1536:W7ZppApUFpEhLfyBtPf50FWkFpPDze/qFsxEhLfyBtPf50FWkFpPDze/qFsAcEhb:6pWpUFpEhLfyBtPf50FWkFpPDze/qFs2

Score
9/10

Malware Config

Signatures

  • Renames multiple (5194) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\54ae4d51981ee0666dbb9c237c4433c0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\54ae4d51981ee0666dbb9c237c4433c0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1520

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3558294865-3673844354-2255444939-1000\desktop.ini.tmp

    Filesize

    84KB

    MD5

    62f79ce674988c0e1951b942b09ebf59

    SHA1

    f7fcffd11fac4ffb31b6eeac396850e2143c5d7e

    SHA256

    7f6f05d144dd9f4e1506290b300408487307d7c4d34980bc1235d7326889afbf

    SHA512

    d36ea5423523d27db552196e06664d1e9c9e444e303bb3b8d533769aaf6b03ec2ef8e14af5995198d42e6ca1b91f13cf67d15dd8ebf27a5aca46de8b9f0dfa94

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    183KB

    MD5

    2bbe8ed4ccc18b4bc3d841f6b4c51ee8

    SHA1

    40c3933fbe69ffc807ea1efe93e0ad2f03a68b8c

    SHA256

    c27e0cb08cb55aea63b7e58264708b88e45d661c7c3e4aa4b97de3502ffdbed1

    SHA512

    7ffdbc9c9199dcb5597f96b02aa0e5a94286199353b841ea2b446ec845264e5fe069e1d115ad104736592cc40b495e36ca0aa5834b054a06adb51ab615f32ab3