Analysis

  • max time kernel
    150s
  • max time network
    51s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-06-2024 05:59

General

  • Target

    2a1f1fc439201d16bcf32f7a0b858050_NeikiAnalytics.exe

  • Size

    80KB

  • MD5

    2a1f1fc439201d16bcf32f7a0b858050

  • SHA1

    662c11d4526390b3f70ee8d6799483b421c34467

  • SHA256

    3d5922deae6905bd245451462d7c250f9fd2464dd25ed5b96e430a2fee2e43df

  • SHA512

    30fa814fdfb778d2bd3698bc497aa9776852b356ce3b4b5bd3548c19208efcbafaeddd4e091a6f3e35b879aa63639adce5c8d3b7961bf7d55913c68cc0f64b7b

  • SSDEEP

    192:tACUADIY0Br5xjL/FAgAQmP1oynLb22v29HWvHWY7GG7Glv2h+H2h+0/kK/kp:GBt7Br5xjL9AgA71FbhvoBl0+c+f

Score
9/10

Malware Config

Signatures

  • Renames multiple (5261) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a1f1fc439201d16bcf32f7a0b858050_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\2a1f1fc439201d16bcf32f7a0b858050_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:4344

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4124900551-4068476067-3491212533-1000\desktop.ini.tmp

    Filesize

    80KB

    MD5

    3a2e47d2bebad0d4e01b36c9db83f3d5

    SHA1

    27008ff8c11aa0e6ad0479846c8b703ccb755063

    SHA256

    e0f4b14fba244e643389764d662fb70ab79bb30a91aa12a90672840861629c26

    SHA512

    3758132d35dc7334f76a98b2befd36892282c70696d89e1a41023d4b85d97c8521d89b8d482cb7163607bc22f475d0b3c11f9aca65dd803f7583089e4076a56e

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    179KB

    MD5

    d1f1a091196ade02c7c7257ab21d8c21

    SHA1

    7976c9a45692cb52260003913e1d10bf6f601516

    SHA256

    791fd3f30d5167d778f1df344f4a66b4402e7029aa7960e5c013e955f58cc500

    SHA512

    4e46a844b8ce67b93e3ac475912b077c98c302bc1ecdc3f97fc7744f0f7ca356df11fdab0aa6dc70f3dbbc31166abe047e6b141f36d9d8edfcb6374a5d30a839