Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    04/06/2024, 22:30

General

  • Target

    0ede7d1549f5dd8efb6b7ff47ae57a50_NeikiAnalytics.exe

  • Size

    48KB

  • MD5

    0ede7d1549f5dd8efb6b7ff47ae57a50

  • SHA1

    2776d955ac8c3ae8767750eb8384ab1cfc99f1e0

  • SHA256

    dc7f3219a20d5742e807f8d6e521e51a6e77e4f152cdeca1f187d8ceb5cb510f

  • SHA512

    b34c4202943e48d4cd0b1c24dec86fc930645defa3e21485df24d1ffccf9d6de5f7ae79fcb8ded28161beec39d030e84d794fa85e9bc3f3f3b46e16e3e1091ef

  • SSDEEP

    768:/7BlpQpARFbhIYJIJDYJIJPfFpsJcFfFpsJcVM3VM3W:/7ZQpApze+eJfFpsJOfFpsJZ

Score
9/10

Malware Config

Signatures

  • Renames multiple (3500) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0ede7d1549f5dd8efb6b7ff47ae57a50_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\0ede7d1549f5dd8efb6b7ff47ae57a50_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2964

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-1298544033-3225604241-2703760938-1000\desktop.ini.tmp

          Filesize

          48KB

          MD5

          34e0cd2c8cd31f5eea88d35f3f4de255

          SHA1

          39b1374543aa23a34ae34d10d1c68438a7008b7a

          SHA256

          0ef79770c68c3cbe8205086c729c55a0e85ffb222c8b12085aa1ce4cccbb23e7

          SHA512

          b00260a108d387d5f684ed62ef886103f8812901e759acd4264bca352676a9875bdfdd078d88c949987f3db8dfc2e8812d97274424694a6ba4da66e241dc1ad5

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          57KB

          MD5

          7673f00924cb6784648522abe1c9f06d

          SHA1

          ac475d0fa6540265eca5f7a1b10e42db8b368822

          SHA256

          079095b562c59d9d523aa95c74bb96c0df65523478ba8a44cecb6aa3eb84cd29

          SHA512

          00ad25fc046697976b22eb9d311d9f8761907922dc97b2418cf93c8ab4cb9a0c7be245f4d850f9665539e832f9cb57049e0585f5f0bca3b3187512eff1631ac1

        • memory/2964-0-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/2964-650-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB