General
-
Target
827f9b83d84385d95c192f650607f6e0_NeikiAnalytics.exe
-
Size
74KB
-
Sample
240531-2g47safh6s
-
MD5
827f9b83d84385d95c192f650607f6e0
-
SHA1
03a737943c80f3d2792dbc9ba06fb184955c1d0a
-
SHA256
75832c6246b8033d842a6a92b7a851562efe166ce5a7e41159b33f0f5df16471
-
SHA512
c29db6a5f56a93c2d51cda95b0074f35d2635846deb5908ae625ac312f3b3a6a26a9655fd99f954980a11286ce9e92dceed6a6e12bdf479128e59e6213c33499
-
SSDEEP
1536:ZfaIdDedRu8UOyaC69srQLOJgY8ZZP8LHD4XWaNH71dLdG1iiFM2iG2Ew:ZydRuxWsrQLOJgY8Zp8LHD4XWaNH71dP
Static task
static1
Behavioral task
behavioral1
Sample
827f9b83d84385d95c192f650607f6e0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
827f9b83d84385d95c192f650607f6e0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
C:\PerfLogs\How To Restore Your Files.txt
Targets
-
-
Target
827f9b83d84385d95c192f650607f6e0_NeikiAnalytics.exe
-
Size
74KB
-
MD5
827f9b83d84385d95c192f650607f6e0
-
SHA1
03a737943c80f3d2792dbc9ba06fb184955c1d0a
-
SHA256
75832c6246b8033d842a6a92b7a851562efe166ce5a7e41159b33f0f5df16471
-
SHA512
c29db6a5f56a93c2d51cda95b0074f35d2635846deb5908ae625ac312f3b3a6a26a9655fd99f954980a11286ce9e92dceed6a6e12bdf479128e59e6213c33499
-
SSDEEP
1536:ZfaIdDedRu8UOyaC69srQLOJgY8ZZP8LHD4XWaNH71dLdG1iiFM2iG2Ew:ZydRuxWsrQLOJgY8Zp8LHD4XWaNH71dP
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (221) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-