Analysis

  • max time kernel
    149s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    14/06/2024, 05:12

General

  • Target

    a4dc468e4d6a60402e99d175b8bdeb20_NeikiAnalytics.exe

  • Size

    79KB

  • MD5

    a4dc468e4d6a60402e99d175b8bdeb20

  • SHA1

    df33f44ed8d62ee451c4266d2287ffa3cce1c42d

  • SHA256

    57594be8d7f7e45ec8641c0b54974bdfb011577bff86875e0dfaf22e3641a7a7

  • SHA512

    f1e139cb9e3a2be9d5ef51ec2910b7babf180155c0aa116475bc964ef0b2b89be7c7f90b02d5f421db83955088419e7ab79b95ba76cb7d30636ac45fe5e0d113

  • SSDEEP

    1536:W7ZhA7pApvOsOKjC0YSilpFpfkJOM2kJOMIsKsc696xZD:6e7WpXYvnd3

Score
9/10

Malware Config

Signatures

  • Renames multiple (596) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a4dc468e4d6a60402e99d175b8bdeb20_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\a4dc468e4d6a60402e99d175b8bdeb20_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2248

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-39690363-730359138-1046745555-1000\desktop.ini.tmp

    Filesize

    79KB

    MD5

    90134bf38fa3f9358418c1f4442cd20a

    SHA1

    b332f90d6b3b38aa2296558d8f5c387879a2ffb7

    SHA256

    503c6643de6b7163fe0b247ffdb12bcf15f9972d9f627477c520edc30e6a31a7

    SHA512

    0915f34ee814449cd3a96474199c0789d4eeeb5f37c487cb7b72074cdcd58a5343ab20a661f4ee72b4b67f578eb606eb470add598da8ddcf40e0a70dce785e46

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    88KB

    MD5

    faf0ca28f5ab0dd19dcd59ff8e5f08ae

    SHA1

    0a4dd3e80490e7692585913366a98958ddd0284b

    SHA256

    4d5c5c61cae85b74eff64f0d483b31205d803180a4235742ee4f20ee74d2bd40

    SHA512

    eb7db550396980b0dba7c19c7bf961eceee3d69879361b603bd33c39e04eee7147cc1a25c2b1416bcbb95fd528c621253fde0801df3538633cd470dee8e8f29b