Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    25-06-2024 23:31

General

  • Target

    23e7bc1a17b79c14f54443a84a7331be7db8c44eff62dc5a8cee8cf5a927e1d0_NeikiAnalytics.exe

  • Size

    52KB

  • MD5

    56e677cbadd6cb28fe945d0b7740df20

  • SHA1

    349b466d95a28e485869621387d50c937c757584

  • SHA256

    23e7bc1a17b79c14f54443a84a7331be7db8c44eff62dc5a8cee8cf5a927e1d0

  • SHA512

    6298c41057c74380dbc0ff1a4a6b8f71bc67c91dfbc8729550076934b0b89c89c87dd540349ad6335e53a4ccea2c794a33364173f3071085dcc95e44f8629da4

  • SSDEEP

    384:yBs7Br5xjL8AgA71Fbhvhwfziz63rmrLsArA5SJOhArA5SJOZ:/7BlpQpARFbhWGUKvrA5SJfrA5SJo

Score
9/10

Malware Config

Signatures

  • Renames multiple (3548) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\23e7bc1a17b79c14f54443a84a7331be7db8c44eff62dc5a8cee8cf5a927e1d0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\23e7bc1a17b79c14f54443a84a7331be7db8c44eff62dc5a8cee8cf5a927e1d0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1792

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1340930862-1405011213-2821322012-1000\desktop.ini.tmp

    Filesize

    52KB

    MD5

    56fde10b6e70e25b5b9cbc061a7dbc9f

    SHA1

    adc994d8b356d3af254fb3b623152375971f993d

    SHA256

    879dc0b1cf70b98842053b8e9509c06457c0eb00df40a63aea32f090ae33cce6

    SHA512

    5fcd9dd39e607ba420000c497268c97e9056612ae6ccd3d24ae874cb16227afba40ec5a7aed0b291ed9c32117d24fd2d8c2cc782618fc28a90232c238e4d0c2f

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    61KB

    MD5

    b3edf51e1e3ad9f6709a87582cd8dd23

    SHA1

    c973d78c4a42dcce0fc459f7fe4f9565da774d58

    SHA256

    f60b5bd5512476a8537ee7078e60653ae334c7c4c245ba83f1ad81098e882300

    SHA512

    872f9b6173f8d7878d695c640055774196e6c4e62f88cfd1a9e5f92380d1c7a34a9597808c2cc2f9bb3fc3dfb18dc1cbc0f7182cb6c0f2c2f55cb09dc5ce6e03

  • memory/1792-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1792-654-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB