Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-05-2024 01:58

General

  • Target

    9ea78aae270a0ef695d95915e2e548c0_NEIKI.exe

  • Size

    105KB

  • MD5

    9ea78aae270a0ef695d95915e2e548c0

  • SHA1

    80b3dc9e5d9f86ac7aed063e315a9e394eec43f9

  • SHA256

    dc874de3fd00b00ba3777c0ea3b460b23bf2d75e276abc3ff277cd9945acae07

  • SHA512

    51c1006f73a9833053219a0558e8ca2d859d49c64a5b6f53c13b92ed09d8e5782abdfb58bea5d2b34966f8e735979f17f5a70605791fafd9f6998313d6af45a0

  • SSDEEP

    1536:Isz1++PJHJXFAIuZAIuekc9zBfA1OjBWgOI3uicwa+shcBEN2iqxtdSCow8hfO:hfAIuZAIuYSMjoqtMHfhfO

Score
9/10

Malware Config

Signatures

  • Renames multiple (4842) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9ea78aae270a0ef695d95915e2e548c0_NEIKI.exe
    "C:\Users\Admin\AppData\Local\Temp\9ea78aae270a0ef695d95915e2e548c0_NEIKI.exe"
    1⤵
    • Drops file in Program Files directory
    PID:4328

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3726321484-1950364574-433157660-1000\desktop.ini.tmp

    Filesize

    106KB

    MD5

    aee201399c3e98260f07b35147c530a6

    SHA1

    4adc4ebec1fca070d18953315928769329d66a2f

    SHA256

    9d10b140897763151e2f415bbaca7dfb54bb46a7c2cfacb9687d70b303bb2b02

    SHA512

    cf96e271f4bbf68db0b3b328828800df56f79521d79c1f8ec420964966acc82074f05721c2938f61f9e17959c41d641415de673a611f0fb8ac46c1b4148d326e

  • C:\Program Files\7-Zip\7-zip.dll.tmp

    Filesize

    205KB

    MD5

    70b0d2b425f39c7428cc748fd54a9b41

    SHA1

    9bee1b366c9e18fcbffe53f3e2a35ceb8bcd1fb6

    SHA256

    166ea61b312f5c26cb885659f52731a3ef046ca893c0fa0a64dcb5912276d3d1

    SHA512

    e2f758aeecaac0387387bcba461e06ff909e2ee449b0263faab83e24d1095170b63571ffa603065d31c5801cb20e3f3bcad74b3492bb0232945da7f9fa624053

  • memory/4328-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/4328-796-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB