Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    30/06/2024, 00:28

General

  • Target

    12e91390e1db2b7fafdbb647e60f5b2d64dcd8fc186ba6ce7a51f5933580270b_NeikiAnalytics.exe

  • Size

    36KB

  • MD5

    6d164d6162589f9a3b068653053c2a30

  • SHA1

    9d9db854a771d9d462bdfc14d6306c3e8ef37344

  • SHA256

    12e91390e1db2b7fafdbb647e60f5b2d64dcd8fc186ba6ce7a51f5933580270b

  • SHA512

    404336de2904c72a4ee2e835c307a120a695101f3dfd1dbf335dce11afea7be0934d02ca12c1f17db307877ffe746c19dfa079410aed5a4192372648e6c18ab8

  • SSDEEP

    384:GBt7Br5xjL9AgA71FbhvuNBN2TQ1nrSLmnsNw/Nw+w:W7BlpppARFbhknrSLmsNw/Nw+w

Score
9/10

Malware Config

Signatures

  • Renames multiple (3873) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\12e91390e1db2b7fafdbb647e60f5b2d64dcd8fc186ba6ce7a51f5933580270b_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\12e91390e1db2b7fafdbb647e60f5b2d64dcd8fc186ba6ce7a51f5933580270b_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1028

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-481678230-3773327859-3495911762-1000\desktop.ini.tmp

          Filesize

          36KB

          MD5

          b35fa4e69b85a425429c02f010fe9e8d

          SHA1

          fdc76a770fd7bf4b29fff957767f67dcdc4600ab

          SHA256

          5f90933e253d5fbffb762fb8f229104a605b2868be68685627da65a07ea64ec4

          SHA512

          5358c859224abb2df2d6fb2fd5646155b411bddb14e0a115bb028a3bc434462ffb578357adfa67d6d6e796a19b265fa64b1b5536d6c3ca9c6aac1340c80c98de

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          45KB

          MD5

          92f35739332f0e68612ac321df3f70d6

          SHA1

          03c0addd16da51502b7e4a18a846d738016c8d2e

          SHA256

          d269f3458c77f03341c2b5d838fd5024866f8f6346ad2e0af9777d87955761f4

          SHA512

          5c13f35fe95d33bbc8be50abf712c7a4a495e74ca91ebcda093ad4a7ae36d78bf096828cddb3ce87c202822b46727dcea71bfc5fe3a445602f7815f45744130f