Analysis

  • max time kernel
    137s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    01/07/2024, 01:49

General

  • Target

    2c63e9bc11d157fbac473912c72bd8e0ff5bdae3be2a84202c708c2107c27ae7_NeikiAnalytics.exe

  • Size

    60KB

  • MD5

    d3a2a7caf647ec8649f1bdce64d4dd50

  • SHA1

    12d52e91838558d86d99723173cabbd952a0c25b

  • SHA256

    2c63e9bc11d157fbac473912c72bd8e0ff5bdae3be2a84202c708c2107c27ae7

  • SHA512

    b6da5cfda10083505aebd24195f877ea42c511723747b9a27211a306319b6fd371cf680bbfb270f33a7b5056194d5a90742f883916bff0c05766b587f42e3a48

  • SSDEEP

    768:/7BlpQpARFbhIYJIJDYJIJPfFpsJcFfFpsJcC+3mC+3meD2qArJtqArJT:/7ZQpApze+eJfFpsJOfFpsJ5Du

Score
9/10

Malware Config

Signatures

  • Renames multiple (2516) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2c63e9bc11d157fbac473912c72bd8e0ff5bdae3be2a84202c708c2107c27ae7_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\2c63e9bc11d157fbac473912c72bd8e0ff5bdae3be2a84202c708c2107c27ae7_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1996

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1298544033-3225604241-2703760938-1000\desktop.ini.tmp

    Filesize

    60KB

    MD5

    456c66904e6a802418a0176d05cdea97

    SHA1

    4c1c4b17864cacb37971b19bde6ccfab35428346

    SHA256

    d9569248fade749fa1ad99abb002cd9684c435918c02aa6ce89d01908c819cd2

    SHA512

    923b0b1663e46f39bedd883d5411c118c4ec71708a95e79bba1fd76b62cdec044139bba8199a798dedc593fc3c04fc6f2568a4702390896628525ad4f34c62b6

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.exe

    Filesize

    69KB

    MD5

    b32d011e0a096435cf56bc47805b164b

    SHA1

    ff04f9e01e509019d1fff44106f1524f744d01d1

    SHA256

    f43fb60a36ef0825f6b549d1e188bcca5098d6294a7813af17b2eecd6a58cf89

    SHA512

    a8c9ed04c0a94bcfc50de0eb4e0c6298020a8c2ba35910a0c3f3bde482f909649c625194c99619806128568afedf52a69007ad04a67f2dfd9676117976ce4688

  • memory/1996-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/1996-160-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB