Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-07-2024 03:54

General

  • Target

    3372f7630b27e4ff2d15ec4241d7ffd5010110b31c034a532004fbfb22c64ad4_NeikiAnalytics.exe

  • Size

    77KB

  • MD5

    675dd6ad0f26b24feb03c153e2528ee0

  • SHA1

    ecf4370432518a925aa252857b59691f5e2b77f0

  • SHA256

    3372f7630b27e4ff2d15ec4241d7ffd5010110b31c034a532004fbfb22c64ad4

  • SHA512

    553d41ae4828d36287a24a40f70a3773ccdd5f1fd1176ab805e23de429a761ea204e1b9db0124e2206c30a94d9e681f6f0bcf465601512f074f46619cdc3ebaf

  • SSDEEP

    1536:/7ZQpApze+ejfFpsJPKZ2wfxRfxzdYaH4c:9QWpze+ejfFpsJPKZ2wf7fVdV

Score
9/10

Malware Config

Signatures

  • Renames multiple (4865) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3372f7630b27e4ff2d15ec4241d7ffd5010110b31c034a532004fbfb22c64ad4_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\3372f7630b27e4ff2d15ec4241d7ffd5010110b31c034a532004fbfb22c64ad4_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:4604

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1337824034-2731376981-3755436523-1000\desktop.ini.tmp
    Filesize

    77KB

    MD5

    4b67edfc6414bb1c0b0f74af36e6a933

    SHA1

    2809c6ca419ced08789d7593af5f94096a3c7208

    SHA256

    e016c6a6aa9f9938442310458714500d652b336507208b058e07c42d3177029b

    SHA512

    8942427de2f6c4f88436a3107f6639e2c35dfdc13460aacc1f59b7f001166ed6d43544c1b5658433a54ee08ff743314d7566712667c09d861a12a9fad3ba251c

  • C:\Program Files\7-Zip\7-zip.dll.tmp
    Filesize

    176KB

    MD5

    417d15edbab27d895cb21231c42fbcdc

    SHA1

    980b2cca0c098456c83df01405b918f4f683233a

    SHA256

    aab53d80597aa1f67dc5978dede0b1e90e68dd085399ed17db703f951ff5c99b

    SHA512

    71cdfff1ca755d80c49485b438d2132c9dc526321c621f0f8f5a4733e8b8a00fbdb634840eadb5974ab249949ea93f7a51a0579aa46c98b9b30f7ac833009022

  • memory/4604-0-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB