Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    25-05-2024 18:04

General

  • Target

    02ff5b3aad1eab842a20a6ad6cf9a6f0_NeikiAnalytics.exe

  • Size

    88KB

  • MD5

    02ff5b3aad1eab842a20a6ad6cf9a6f0

  • SHA1

    eeaac7922b058476bea89a87bc0af509423a49e1

  • SHA256

    7c0f17be2e32e1bcad970b650071a3f0cc0061b80086def5bb8dd89ba5946428

  • SHA512

    10e374878c6be4649721e6d64f3c975abebaad294c52f76c7aa1b75acb3d308a10d477e30bda2187ddc041a03eca7c454e5be666123814dd5fe0dd8d90ecb0af

  • SSDEEP

    1536:W7ZhA7pApMaxB4b0CYJ97lEVqNR7Yge+eJG/x/0VXausaLsab:6e7WpMaxeb0CYJ97lEYNR73e+eKZ0VXt

Score
9/10

Malware Config

Signatures

  • Renames multiple (3676) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\02ff5b3aad1eab842a20a6ad6cf9a6f0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\02ff5b3aad1eab842a20a6ad6cf9a6f0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2236

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3691908287-3775019229-3534252667-1000\desktop.ini.tmp
    Filesize

    88KB

    MD5

    60a94c1293dbfd7fb6be0add67e51fb6

    SHA1

    371ca3de0adf1ea40061e18a74e23cf6da596a95

    SHA256

    fa831231e5480aea5fc638c09d45c38a0f6c91c697245591758e27481c9e8dc9

    SHA512

    37b177222b66588e9a16d9c3e6e2f21d63d90920e4f24cf6a801e9edd7ef3589b6e717ed9bd968ac4d54dbe9d599640e052e75f8bc97a86a4314bf23f576360b

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    97KB

    MD5

    27047421f1de2bec0f3bc204c1fcc5d0

    SHA1

    560044a1b054337e39b9a00180c47e4adde66e47

    SHA256

    3bc3ec4310f3452f52fd650624b12aa80de5f55ff646255a4dae679692e1b2fe

    SHA512

    e3dae84f3fcae716bae11cb1ed27d28436eb7f598c86f4e9a4d3bf1c27777f891fa9f3e36fb5ca73b55fd653301d255f58bd955476d805d29b0efd0dbd8caf25