Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    11/06/2024, 00:36

General

  • Target

    21103031635221dd5f0620ee7f890c20_NeikiAnalytics.exe

  • Size

    53KB

  • MD5

    21103031635221dd5f0620ee7f890c20

  • SHA1

    af44de2fc796e1092479d51779cd15134fd66a4e

  • SHA256

    fdb2edeb35acc42eafd3951cf4c8575e96ff0e8c5200de2c2c6fdd4f87c59797

  • SHA512

    8109ddee52c0b8c061817fd6671c5ff28e57bf00852c08f82dc37b9919fc318c7af421762aa9726adb817957cbffec1e6195b123a8161de64df0e9d4a455034e

  • SSDEEP

    768:/7BlpQpARFbhIYJIJDYJIJxfFpsJcEKLF/MF/Z:/7ZQpApze+ejfFpsJPKZ2R

Score
9/10

Malware Config

Signatures

  • Renames multiple (3742) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\21103031635221dd5f0620ee7f890c20_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\21103031635221dd5f0620ee7f890c20_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2180

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-481678230-3773327859-3495911762-1000\desktop.ini.tmp

    Filesize

    53KB

    MD5

    8d357b14355b4d5712d20149c420d0d8

    SHA1

    d58cf768223d3346f59de3ee6b5c6345134a20c3

    SHA256

    fc5e52c96f95a9e0d69427d2cf3a89bb66e2d1f208a8fcba946d5598d9c81d6f

    SHA512

    eff2c74f6bc7fe2625797e1d205a55ccf615d20b28c93aaf222c7d7741da3ab17016061d7e736fae854535059f5de211dcc976c8a08aae033eaa3b403dc80205

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    62KB

    MD5

    28adc6d3b79c1fbcc3aabb81c4f71705

    SHA1

    ba83bd4583792bc7cb2baeca32fe7ef7a37008fd

    SHA256

    548a7aa99a6e0f45de03d5ea79eb3ccb4eb1c2189798fa8d3af95c40c2f54ea3

    SHA512

    5f6d179a214816e5d20fd3b3cb7a031f6fc1e4dfb7ddb0ed13e17dab5acec811c2928d4ee5a137905829bb5166888625d4fc1619baed6d24e6a63315d1c8b7dd

  • memory/2180-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2180-656-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB