Analysis

  • max time kernel
    150s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/05/2024, 23:28

General

  • Target

    65a2f438e5a7656c75c2e7fed6ebfc60_NEIKI.exe

  • Size

    172KB

  • MD5

    65a2f438e5a7656c75c2e7fed6ebfc60

  • SHA1

    89dbf410dfa331436b8392f6b2f42257df6ddd0f

  • SHA256

    a06c6721f446614fcb482932f6c12f649af882d526c0350607fa663eb2cc3778

  • SHA512

    4b22ced6dea39ca9edf50866a2b271c862e6c099d386604f727de879dcfdef1f40a6d2a884fc0e87c419c8505be44f74a9029928399d6b362bf84fdb6dc0ab1b

  • SSDEEP

    3072:fnymCAIuZAIuYSMjoqtMHfhfBnjFAW+FmD:KmCAIuZAIuDMVtM//nqoD

Score
9/10

Malware Config

Signatures

  • Renames multiple (4727) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\65a2f438e5a7656c75c2e7fed6ebfc60_NEIKI.exe
    "C:\Users\Admin\AppData\Local\Temp\65a2f438e5a7656c75c2e7fed6ebfc60_NEIKI.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2872

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2860750803-256193626-1801997576-1000\desktop.ini.tmp

    Filesize

    172KB

    MD5

    877ba4e828bf46a75da2106f1d66683f

    SHA1

    0bcd0f6e461de1d0c0c99e0aa956a6b0f34cb974

    SHA256

    018451bcfac53b52891d602da363374d36122b0984690f95951b3ff5d19226e0

    SHA512

    b47fa3ddccd3d24efd8bf67984734b1da1f78de7de4f34d95872bb24ac0e83f8dc149685b63ede4ff6fe1fe6a8eca4e149a850fd771f3cafb0a184980e925460

  • C:\Program Files\7-Zip\7-zip.dll.exe

    Filesize

    271KB

    MD5

    634c4383484f8e5709516bfcb1571017

    SHA1

    72d09b3c652fbf8c0ad31270178fdbc6396bdbb9

    SHA256

    55f272036e48c24c057115913230677309795e2e5f902f8553af2ee1c4f24129

    SHA512

    538cd25925c55a76457326fcce93822bc0c924c4f1fd88c1534b332218a1d30862c0c6f3fe303d672e731467b4fe66844138a96bccb710e974b9f578c0488265

  • memory/2872-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2872-1626-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB