Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    19/06/2024, 23:41

General

  • Target

    18e65f33c6786230ddb46986fb0302d59a58dbf054374bc14c9daae20e87620d_NeikiAnalytics.exe

  • Size

    92KB

  • MD5

    3f6841f119b5fbd84264521c293115d0

  • SHA1

    8a2d65de2205355cbdf6e2ae158bf76dec89f1f2

  • SHA256

    18e65f33c6786230ddb46986fb0302d59a58dbf054374bc14c9daae20e87620d

  • SHA512

    00dfc7f00ff0020977c21e9ac2b56f6bdf688e4ec4a5104e7ac327209f2a0b8d29b9658a8c516c0f7757ae681f8c7ebc97a72ebbb585289fa3143386354c70f6

  • SSDEEP

    1536:W7ZhA7pApMaxB4b0CYJ97lEVqNR7Yge+eJG/x/0VXaqv3+uM:6e7WpMaxeb0CYJ97lEYNR73e+eKZ0VXS

Score
9/10

Malware Config

Signatures

  • Renames multiple (3470) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\18e65f33c6786230ddb46986fb0302d59a58dbf054374bc14c9daae20e87620d_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\18e65f33c6786230ddb46986fb0302d59a58dbf054374bc14c9daae20e87620d_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:3068

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2721934792-624042501-2768869379-1000\desktop.ini.tmp

          Filesize

          93KB

          MD5

          b6162836d2c1d750de44225a52f2a5fb

          SHA1

          96d3c4d74d56c7a3f27508a2153915fed61bcdd7

          SHA256

          a42c36aae55e7a1361a637e5305770a0884118ec7bb5c9354f2fb6afc4717e01

          SHA512

          77afd36ab6f5d221caec84935c68263adb5a8d374c643240cbd465b0013a471b8e090ec19fb982095ab348a5754878ff22dba620a435489caeb3cdfa2e6e553e

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          102KB

          MD5

          f71b58cf6200f517cd05d5cb09d5c38a

          SHA1

          7d1901775b9f9fa1efbf522ce6f519c20aba7112

          SHA256

          7d766c850dcafc42d6d691a35f1f266b2e70fba29cc0328a46d3faf81136c0df

          SHA512

          99fdd06369c3479709637fb918aca46e5a0e28b271067158054f85a9f7e231540c8d23e62c1ad2dc9dcaa6407761f0361e84f100464d42c778d5696f7e16a05f