Analysis

  • max time kernel
    150s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-05-2024 09:07

General

  • Target

    3c9868d648a2a6eba861504d8f663d00_NeikiAnalytics.exe

  • Size

    85KB

  • MD5

    3c9868d648a2a6eba861504d8f663d00

  • SHA1

    210978a82897863fb3ea4c9ef1e6f126fc6924cb

  • SHA256

    6b8eb957742c0f51fe0c9081d5ae6785f6afc9c81ccc28b045b8b8b6a03326fa

  • SHA512

    e5376a740449677dfdd11eef3b13b0b9ce60bb94978c085f980ded145d9991805c496835bb9152e0a1fd7a2c763af21608a72e9192e8bf4ff99f3b1b388af2d2

  • SSDEEP

    1536:W7ZhA7pApMaxB4b0CYJ97lEVqNR7Yge+eJG/x/Wys:6e7WpMaxeb0CYJ97lEYNR73e+eKZy

Score
9/10

Malware Config

Signatures

  • Renames multiple (5005) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c9868d648a2a6eba861504d8f663d00_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\3c9868d648a2a6eba861504d8f663d00_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:4856

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1337824034-2731376981-3755436523-1000\desktop.ini.tmp

    Filesize

    85KB

    MD5

    d892850145b5612ee5e4105f915e6cc4

    SHA1

    daec83b75079cf42c9a65b3eda794f1de9ed0b6c

    SHA256

    482eb1c94bcfb83196ce36e985752084c98acca18258bbeebb334e08c78236bc

    SHA512

    b045566b6cbe0316ec47e66ddb6f1209f1abd7da4ec4dc0c6201e2d598fc9580975e0407d331a0906bfd7bb72b5b7d472f21c62cd45cc74a2092ff06b07aca41

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    184KB

    MD5

    a8b5b7899b658c50931955e6959ed638

    SHA1

    965c44dde2ed823677c286c0d4dd9916faa364a1

    SHA256

    060bde15e0748225087600b4e8df77ec4c0d42f01e804e95adbaa7a3fdbb6623

    SHA512

    9b15a525054208084f8cdc1f21a5194e97c611e7eb63bbbf1f709967592adab24eb10438dc6496a6da18547de90424e5d08fca0478346296fa696e85541c2aaf