Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    29-06-2024 21:52

General

  • Target

    032601ba4b164d62e1869183b8bfe5a716ae084af72ffe45b90eff748cc35b5e_NeikiAnalytics.exe

  • Size

    86KB

  • MD5

    7128224987fb2a7ffce031a33a937ef0

  • SHA1

    4ed420c8eefed4b7965e4926a7e14a97d576bf76

  • SHA256

    032601ba4b164d62e1869183b8bfe5a716ae084af72ffe45b90eff748cc35b5e

  • SHA512

    6a31ada6fcffb241ce801f9b1f06780f16a71164f557c135922cf38de8af41ba0eeb1c9ece70b9e8739237a96d66f06cd4bfde42d752a0712ab0fcb48320422f

  • SSDEEP

    1536:/7ZQpApze+eO888888888888888888888888888888888888888888888888888C:9QWpze+eO88888888888888888888887

Score
9/10

Malware Config

Signatures

  • Renames multiple (3502) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\032601ba4b164d62e1869183b8bfe5a716ae084af72ffe45b90eff748cc35b5e_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\032601ba4b164d62e1869183b8bfe5a716ae084af72ffe45b90eff748cc35b5e_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1752

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3627615824-4061627003-3019543961-1000\desktop.ini.tmp

    Filesize

    86KB

    MD5

    027b06c0ff83f5d51a3959c019dc89a8

    SHA1

    d3b154e5a7b19e125f649f2aaaa51d71dbe602af

    SHA256

    4b268f1ecc36dc5028bcf4fb9a6a374d48ac8a9ede7e64ad30fc72f25dcd3d3b

    SHA512

    696054180e87ebc5cbc4e8a00836fc64b4ee4b0487dc6a1cc98d12b41ecc3ae1056f284f3ec015d634fef63b218ee579416cbf1cda0c481b6791ab68180ae581

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    95KB

    MD5

    2bf093a7054f230fea0bf74a913e4206

    SHA1

    eaf172be224cb08a64690ff6e810f539fc554038

    SHA256

    90e2d155c886094118f8af8939b526065455f89cfcb6d9668030da3d674374f5

    SHA512

    23b614c0b98a6ee2a19cba3aaff77f9d28b1464d60c04dc0dc263ab0481a635043adfff828c7602ee59250377f20c734272e3501269e6170c695def6eea08357

  • memory/1752-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1752-652-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB