Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    29/06/2024, 23:06

General

  • Target

    0a8a8d27b7828b9035b2b7db3f0a4d0c0da507b8a22b66bc8d98e45d439ca123_NeikiAnalytics.exe

  • Size

    69KB

  • MD5

    cd4d3bb4ec86aed86654e6769fdc4210

  • SHA1

    94bf5d80a1c7fc9fe6dcce4aba6b694889630d13

  • SHA256

    0a8a8d27b7828b9035b2b7db3f0a4d0c0da507b8a22b66bc8d98e45d439ca123

  • SHA512

    1f52f5c00e0915d10c53565edcf51c36bd6a2813dade48a941960bc8eb46b3a0dec8426df6ed9e6c5afe52fbd392b704096be37c36437b72ff86037f695ba694

  • SSDEEP

    1536:/7ZQpApze+eJfFpsJOfFpsJYp4p3pqpglgZhZg:9QWpze+eJfFpsJOfFpsJYuflgZhZg

Score
9/10

Malware Config

Signatures

  • Renames multiple (3512) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a8a8d27b7828b9035b2b7db3f0a4d0c0da507b8a22b66bc8d98e45d439ca123_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\0a8a8d27b7828b9035b2b7db3f0a4d0c0da507b8a22b66bc8d98e45d439ca123_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2088

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-1340930862-1405011213-2821322012-1000\desktop.ini.tmp

          Filesize

          69KB

          MD5

          f0cb8cb3a0e59423a92f8530613404a6

          SHA1

          8ef9b03f52e99efc2a7c1a8e0444ce6a4e0fb953

          SHA256

          682fbf372d1821574caf0c22e56d01b046875d5aee1aa3f8ad1c911798e3f4b4

          SHA512

          5eea2db908d9affc17b21eea930908d950c7c294bf2cf649c597915cf0566a71bd82ad0f7abb6f88ce5946e28c044305ef75247d29939c97df403d39a4ec5ed2

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          78KB

          MD5

          f9ea46c3e3ffda7559c7c494f4d18659

          SHA1

          efcef3477bffb5b5b1011ba5457f508231d8bef4

          SHA256

          3db56c8a1c4884ae22310875514153006e26923c6648cd4d26382e4a767d1ef0

          SHA512

          59ff819f27455d19e806d0a30be496856678d9c215992d9dd6b16bd91a924b1d2eff4d8cee1c3b1c1d4178f8f0f05538059505ed03ec1cfe9a0117bc3f275298

        • memory/2088-0-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/2088-650-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB