Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    29/06/2024, 12:06

General

  • Target

    aabe095f868e703f6e29f8875329bb5d8cc8667afc75c78d632933edb0728486_NeikiAnalytics.exe

  • Size

    56KB

  • MD5

    fb85238fd3ac322af3f5b4ee6e1f60f0

  • SHA1

    c2939011bfdc20d5827687c0d2682f5a8ef1020f

  • SHA256

    aabe095f868e703f6e29f8875329bb5d8cc8667afc75c78d632933edb0728486

  • SHA512

    b2189062f47f1f4d662a92fce323233843b8faa6beba0ededd8ae693e7b48311e0b0d722d8f9254cbf4da12818e93c709f5bb22dcdb84afbc101512395515faa

  • SSDEEP

    768:/7BlpQpARFbhIYJIJDYJIJPfFpsJcFfFpsJcFw7:/7ZQpApze+eJfFpsJOfFpsJl

Score
9/10

Malware Config

Signatures

  • Renames multiple (3729) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aabe095f868e703f6e29f8875329bb5d8cc8667afc75c78d632933edb0728486_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\aabe095f868e703f6e29f8875329bb5d8cc8667afc75c78d632933edb0728486_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2960

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2721934792-624042501-2768869379-1000\desktop.ini.tmp

          Filesize

          57KB

          MD5

          9a2621ab0b0f3e5c5b1c95845cae9409

          SHA1

          7af2a4cde5b4d4bef1d819610e1cf54445c45bf5

          SHA256

          e34bf5029370ff9e1c7a38665dc710cb690b4c9f6e86d7fc4704a16c877a454d

          SHA512

          90819ca94c243b2bec95329ca474d38b3e0a46dffe0d24177e696fb9c4d03d416b00429c0cea735d2b1250c338ab2adc0a6a830e47ece74b75cc333fd6d77915

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          65KB

          MD5

          52aa4bda44d217b309063cdb2a2e0198

          SHA1

          c675d5babed680694a93a997b6cb899335e1c254

          SHA256

          0223fb13a8d57eb1c158929c2d0082467bf1e223ab5a6171c182f142c2ca5add

          SHA512

          503ad51783d413be1be06de03595fa7b66c8d5f0dd2992e0375391523ce140398bfc6a46ce400fe8c12593fab53ec718bf2f75972992bdddb817069f0170b30e

        • memory/2960-0-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/2960-652-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB