Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    30/06/2024, 22:38

General

  • Target

    1f9d9d76f6ebd39c90f4d826e92daf8ad91bef79283a71d1d36093a2306a4a4d_NeikiAnalytics.exe

  • Size

    98KB

  • MD5

    d06a72a026c4c3a0251ad4ed45d23970

  • SHA1

    2c55d3c6ed1310735538049a62658e727accebc9

  • SHA256

    1f9d9d76f6ebd39c90f4d826e92daf8ad91bef79283a71d1d36093a2306a4a4d

  • SHA512

    5b7886d0e5e5f320e1c1f2629911e4ed78f0a9e1ad50d7cd6194b51dc37a871275bc1d6126357bbc87d1526e864f92b2d01c416f6a29c510d5ef5116c6474d15

  • SSDEEP

    1536:W7ZDpApYbWjIlE77ufL2e+efZwZQ/8S/8z3MLI:6DWpwE7oL2e+efZwZ08i8z3MLI

Score
9/10

Malware Config

Signatures

  • Renames multiple (3443) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1f9d9d76f6ebd39c90f4d826e92daf8ad91bef79283a71d1d36093a2306a4a4d_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\1f9d9d76f6ebd39c90f4d826e92daf8ad91bef79283a71d1d36093a2306a4a4d_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1720

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2737914667-933161113-3798636211-1000\desktop.ini.tmp

          Filesize

          98KB

          MD5

          d6d7a58ef32adc42fd6b3e087770b980

          SHA1

          010dac87a697c60fbd8a28307f57b36e3a1fc3b8

          SHA256

          d832f7f34a2ab2a88ee42c17cb6611bb36e776d8860ebfabcfcbd94f80ecdc07

          SHA512

          556917a157e25ea67a6825c3ffe5e2a453a84cf205108e17f59b7fe705b69c270d7f18fbc595e022d7f45a9698f6f1342eab507e95cb44ef99b360d43cdf433b

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          107KB

          MD5

          ae26668dde5c749a2d2b863050e3e614

          SHA1

          f608b7601f865f55748fcee65a0a07e72751687f

          SHA256

          9d55b90dcc0a988a42009b685ee0dcb117e68b3776062a04a7e3820964f95b79

          SHA512

          6ab29aa40a6b0ffd43809dba8648b79c1e33c34b8eb0edaedc57a248848b01f6238921df1c235be5ff1bc70b5cee57bc9e8c350c33c072fb87f028f3e06f5e87