Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 03:54

General

  • Target

    3372f7630b27e4ff2d15ec4241d7ffd5010110b31c034a532004fbfb22c64ad4_NeikiAnalytics.exe

  • Size

    77KB

  • MD5

    675dd6ad0f26b24feb03c153e2528ee0

  • SHA1

    ecf4370432518a925aa252857b59691f5e2b77f0

  • SHA256

    3372f7630b27e4ff2d15ec4241d7ffd5010110b31c034a532004fbfb22c64ad4

  • SHA512

    553d41ae4828d36287a24a40f70a3773ccdd5f1fd1176ab805e23de429a761ea204e1b9db0124e2206c30a94d9e681f6f0bcf465601512f074f46619cdc3ebaf

  • SSDEEP

    1536:/7ZQpApze+ejfFpsJPKZ2wfxRfxzdYaH4c:9QWpze+ejfFpsJPKZ2wf7fVdV

Score
9/10

Malware Config

Signatures

  • Renames multiple (3222) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3372f7630b27e4ff2d15ec4241d7ffd5010110b31c034a532004fbfb22c64ad4_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\3372f7630b27e4ff2d15ec4241d7ffd5010110b31c034a532004fbfb22c64ad4_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1364

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3627615824-4061627003-3019543961-1000\desktop.ini.tmp
    Filesize

    77KB

    MD5

    42c5f80b5b0f20efdace5fa5aa6085b9

    SHA1

    eb410db1463efd25c831be0400d7a7b3576ae869

    SHA256

    d53b52ee8ec5a60f4ac4941cf408f2bbbdde7842829cd3d10ef4be57bf4e9e58

    SHA512

    09870dbcda0c8f3bead0e3f4381fc5f1a86dea026d095af402d8e4be897e3046e8a9c0a1ebad0ab48686cb5476629233470cac8bab3f43a5391cf834e1341339

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp
    Filesize

    86KB

    MD5

    29f80a0ebd80b34a8081c7a9401f0508

    SHA1

    80a3704ebfcfc598e4c18aca734e0ddddf8e78be

    SHA256

    a98d5c41448383e7f5d22b9e733ce61c68e63e05f3e97ecc11910514640310b6

    SHA512

    ccb92450313842b37b9e35e093ce91e7f45f781f62e5398029e9211038e155d2f25969d72ceba894daf1a8ff745cdbe617b8af6814f26f41a2a0f33d43342571

  • memory/1364-0-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/1364-186-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB