Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-06-2024 07:16

General

  • Target

    dfe90576fb06b7c915c1b531ab388300_NeikiAnalytics.exe

  • Size

    88KB

  • MD5

    dfe90576fb06b7c915c1b531ab388300

  • SHA1

    7144c9a325c7203eba9bf855980c8d190e5a4bd7

  • SHA256

    b67bc8cd6093155c12a0925cf479d7e9be66aec3e55e8e347f1bd1b0fd28486a

  • SHA512

    585bd3d875b2bf5c733fb51ab3a52405fad062329abfb0a1c25ea7bdb89914d295e5e75b906ef5703c58edaaf9906bdad9a57f29f102053c67a8a957ded910c1

  • SSDEEP

    1536:W7ZhA7pApH1d9oVLQthbqbY9oVLQthbq51Rn6b+W+V76U:6e7WpP9oVLQthbYY9oVLQthbUvJ

Score
9/10

Malware Config

Signatures

  • Renames multiple (5033) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dfe90576fb06b7c915c1b531ab388300_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\dfe90576fb06b7c915c1b531ab388300_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:3968

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2447855248-390457009-3660902674-1000\desktop.ini.tmp

    Filesize

    89KB

    MD5

    61654ae9209824e71ae3a15e0f2746f3

    SHA1

    225858b4184c84a5226694afe391a91c845cf883

    SHA256

    6eb6f63785df3090295feb85a6e7267ee39d7f511f1e4e02dd87fa50a1b141b4

    SHA512

    81f4338bd9f1b13c09bac3d95fb350fb1899be43c2f3fbd1f3323e8915d724dcb3a463d6ec98db24652305fa3150406b5e206214582058fe497df592ab4d34d1

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    188KB

    MD5

    ade89fc610948a8d5cfd870a848258c0

    SHA1

    ff00a5d6eb0b7c61d044b2d2b7aed258abd00999

    SHA256

    0a907538b98e430d25350d3c751d30014da5075debd856c634ec2d2a8b8ab3b4

    SHA512

    92d01f7a8e3f5e9770ef5d1e04901ddac6b5b78ed7e28b45a8a1fe884bf5d2c042138e57d49a7672a229ac41cbeb9980c6d4fe7c88274fe24125fc49a0aca5cd