Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    26-05-2024 03:16

General

  • Target

    5a27cbbb03918761175276dd482de470_NeikiAnalytics.exe

  • Size

    83KB

  • MD5

    5a27cbbb03918761175276dd482de470

  • SHA1

    cad1dae1e7fe494f2b6ea3da9c92d768fb8ed200

  • SHA256

    e2c790b79b9352d62bcf04969bf28becf1e97e33510eb48c3631d2b7258656a8

  • SHA512

    04e47d48f4e6933ca38745847bb31e3fe2de6e657fd8e3d131d6bdf690a07e4421f49ae7aae8b6167caeb968845a35a23154c19486a86e956ab4d1a952855267

  • SSDEEP

    1536:W7ZhA7pApMaxB4b0CYJ97lEVqNR7Yge+eJG/x/0VXad:6e7WpMaxeb0CYJ97lEYNR73e+eKZ0VX8

Score
9/10

Malware Config

Signatures

  • Renames multiple (3454) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5a27cbbb03918761175276dd482de470_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\5a27cbbb03918761175276dd482de470_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:3052

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-268080393-3149932598-1824759070-1000\desktop.ini.tmp

    Filesize

    83KB

    MD5

    68f4156c461eabe1e79a300fd5147e10

    SHA1

    62f4a5a6f89575d958c994e095ef1aa9e38e8929

    SHA256

    a9a8098fc46cd3165511878efd75b70c451d14bb87c266375a7f37a8a16c5afe

    SHA512

    f533c1d117b0fc2c83eaad151776bd5c820c1e175bfa90a15c5f3b1e4a5a675837f69757cc89515f0fbb0ad9ba14f60898c349ed1d660a540398914ef0599e25

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    92KB

    MD5

    986fa890dae1e8c1ddd7cb12a4dfeb80

    SHA1

    26307e24bb0277733050dd17fd2f4b8527933e4a

    SHA256

    8ba5f755f6c796761338e8ee67a3cdd76c437133b13c171b1589c2b13c47e9bc

    SHA512

    0b04722760a9abe0b14d64b582c240142f6de5deba2e725f838fe2868eed67ac3c0272728eb44e9599648082f82c869402bc7c588fe2c584418c8f84d2c66d6d