Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    07-06-2024 09:21

General

  • Target

    49f071820727c04af124479e25a302a0_NeikiAnalytics.exe

  • Size

    51KB

  • MD5

    49f071820727c04af124479e25a302a0

  • SHA1

    15475cf0518513235a134e3771baa1a4e411c367

  • SHA256

    f27db296cb77bf592024bd0c2c7a8d405d86d90cacb63510d1a25a3b670acef9

  • SHA512

    b0cd9ca781f6db51a657da6824d992b0c8c55bca44d45056086920ed4a355fddc11160330a185a2eb188ae680ca2185c8aa14ab8220bd9c5bcf0fbd0b91e4413

  • SSDEEP

    768:W7BlpNLpARFbhblkYlkrt8PWGoPWGqMs1MsC:W7ZNLpApCZrt8PWGoPWG1

Score
9/10

Malware Config

Signatures

  • Renames multiple (1259) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\49f071820727c04af124479e25a302a0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\49f071820727c04af124479e25a302a0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2076

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-330940541-141609230-1670313778-1000\desktop.ini.tmp

    Filesize

    51KB

    MD5

    51f9325954fdce94580b962a39f0048d

    SHA1

    912877a514397e1207cb25ebf9980bc7c5abd5a2

    SHA256

    a72fb50705cee8256a27112dca63688f9d633a0b6722ebed114eea7151b39b0c

    SHA512

    86745f36a7d9c789c7277b05b5f63646b76ea19db5147065f0c53edddc6796a7d3ae6883c9a0bd31dd5604532c4127034637deb68b1342d1b040449063ff43b2

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    60KB

    MD5

    616b3c7c454ce7520499ae6444e9ff1e

    SHA1

    18a4ba4363352cb092111928b81a25cee6b78b4e

    SHA256

    d52b8ef319e5ca3b57960a0f6b0e13e7aa9a964d13e451356e0ef8d5ee922338

    SHA512

    22c3df4d97e3bda1cac02833f5c609d10fb1927e5e4b42b8cb9bf6663ec2d8c41136e13fdd78b03dfcf00a11f06df560b9d0f1ec0c543e4ff6b6a3bcc3e3daed