Analysis

  • max time kernel
    149s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/06/2024, 13:30

General

  • Target

    ad7774551c4c84de50075c699358df7b9df6a431918db850ca94212fef3a86c3_NeikiAnalytics.exe

  • Size

    51KB

  • MD5

    e4a9155598fd0e19572046d8e478ca30

  • SHA1

    afc02407abf3e07ed6b2d174c5d220166956e458

  • SHA256

    ad7774551c4c84de50075c699358df7b9df6a431918db850ca94212fef3a86c3

  • SHA512

    123af540a755fdc51aed4b1f4052e40c1356bf7655492928e678e40ae8b89f7800b8b03089d9c9e3dfaf994843256a79a4b18970c8db73dad030b3e6abe9a3a8

  • SSDEEP

    768:/7BlpQpARFbhtF1XxXEhk81fFpsJcFfFpsJcY:/7ZQpAp9XxXEhHfFpsJOfFpsJF

Score
9/10

Malware Config

Signatures

  • Renames multiple (4833) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad7774551c4c84de50075c699358df7b9df6a431918db850ca94212fef3a86c3_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\ad7774551c4c84de50075c699358df7b9df6a431918db850ca94212fef3a86c3_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:4680

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-4204450073-1267028356-951339405-1000\desktop.ini.tmp

          Filesize

          51KB

          MD5

          db20c6de8cc83d1c46e018545df8b793

          SHA1

          e74de342a13226ada1324842ae45cf19fdd1ae32

          SHA256

          4cebd6e05d786ba0aea03d8901ae7cfea7e8148890d884cea1bd83b39703323c

          SHA512

          c06529bb622000aa2ab6334f869452e4e6fbbbee7ea71517b842158cc8ded735e8b6346113f77d411d73be33f0ddf5350c1acd63a3249f225d8e36dc8e44e258

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          150KB

          MD5

          0a33eedcb245d728c2e46dbbe1fd6209

          SHA1

          8a8fbf7a833784a85a981ccabadeb85bac50cd96

          SHA256

          32b94514f242dba19c59447d538cab8809eb66b5a4f3687828dc713168a8d397

          SHA512

          aaebb63c740dd9476e0231d89e3e9ce250840b17b004dfe8a4cab20519a05c1d4d8d7ac0409f127249ed75835e88163a19473150e7cce1478b8aa723ef275c4d

        • memory/4680-0-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB

        • memory/4680-1784-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB