Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    11/06/2024, 10:42

General

  • Target

    320d9136a12e2e04e94f21612254b7c0_NeikiAnalytics.exe

  • Size

    48KB

  • MD5

    320d9136a12e2e04e94f21612254b7c0

  • SHA1

    9058423fdb2e4e43409d7949fc9b693624b2b285

  • SHA256

    334b3d44b914d625cf66c7d140f450d4e14fe87a03bf6d3510d3d94db55ed6ca

  • SHA512

    d616b422d39ff3fab747219991d373a78a205266d166b2270692f8110c31318c20571b11b020abdddb6f3c8125084a0a82d43bb2c321e1243e81b15b61b5cbce

  • SSDEEP

    768:/7BlpQpARFbhIYJIJDYJIJPfFpsJcFfFpsJc3qQ:/7ZQpApze+eJfFpsJOfFpsJyqQ

Score
9/10

Malware Config

Signatures

  • Renames multiple (3766) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\320d9136a12e2e04e94f21612254b7c0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\320d9136a12e2e04e94f21612254b7c0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2784

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3627615824-4061627003-3019543961-1000\desktop.ini.tmp

    Filesize

    49KB

    MD5

    7cda04404e740c98095ca062fb555d19

    SHA1

    836b036bac4cb0b93dbdd76d118fc3d12da34769

    SHA256

    3469ac44a8efd3c1091d94435252af5057d3e25f4e922ea119cf228d8574e319

    SHA512

    e48f46fafd9166773c0d30489742fefc5d7f44cd6ebe327f33312d8c7d7f2f0f685385e0cd46b2d1a692c591aa069c4813aa426c6a6b071652295202dd829fdf

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    58KB

    MD5

    0f816934c4aa11866ec35d831005a9b6

    SHA1

    775f09e58833e58de60b682639d124d5dc5ec58e

    SHA256

    e705c3c97a171ed809a11d2d41ca2e504e739073dfc2a25234183407ef422f50

    SHA512

    524c9b0a0fb2e9337358b8ec89b5ba33969353e6444349731d1edb180154c2edd77f9051e8230a1f5079476efb3dadb0b8407995733033a981f81e6ab34844bf

  • memory/2784-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB