Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28/06/2024, 00:26

General

  • Target

    4b8c793feaff5b6c3df17a5eb00f8f7f879abe543514361cce7df88ba1b3a486_NeikiAnalytics.exe

  • Size

    80KB

  • MD5

    681d6ea7778ded0bcb69da05170ebf10

  • SHA1

    e8393d5bbaaf885e709da88796317f2e51e42ef3

  • SHA256

    4b8c793feaff5b6c3df17a5eb00f8f7f879abe543514361cce7df88ba1b3a486

  • SHA512

    210e81fdcfa0096b336539d4aa0bac4893a20240481fe5ef310750096ccf5443d6ae9c8331d6dd464107b98cc7c37d045b5efb6e73f3e5cf7cb5a1511361304f

  • SSDEEP

    1536:/7ZQpApze+eO888888888888888888888888888888888888888888888888888c:9QWpze+eO8888888888888888888888F

Score
9/10

Malware Config

Signatures

  • Renames multiple (3482) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4b8c793feaff5b6c3df17a5eb00f8f7f879abe543514361cce7df88ba1b3a486_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\4b8c793feaff5b6c3df17a5eb00f8f7f879abe543514361cce7df88ba1b3a486_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2168

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1298544033-3225604241-2703760938-1000\desktop.ini.tmp

    Filesize

    80KB

    MD5

    24920685ff55327d783384b4f949f7f9

    SHA1

    dd5c823d40aa7dba9fbd472e223ce3192b63edfe

    SHA256

    b6a841d2f92174148b1738923156b4a591583c43174ec395a8cc426fee474794

    SHA512

    af6e371af66e8ba960565fa010decf94537494741d7d6e97184b9a084fd55902e5c2aadca85c9425117db4c2e2ed9e8e0557cbe97a7e4a792d39f7b436152e3b

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    89KB

    MD5

    c4c5e6f755fd37fe011ff681948ec8fd

    SHA1

    23023b2d9aa877fd8f8f05b8c883538b30517707

    SHA256

    895ed81081d4d545e706976f0f40eef14c4687836ef413fb2af3f47f5419871f

    SHA512

    02c16cf2f164434eb70940ac47e23e3457eb5fbcfb7a8690544ea5885559cfca77e480e0993e0172b556c5b0501367b2b1199bc3233d8335aa581a68b0ab67c7

  • memory/2168-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2168-658-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB