Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    08/05/2024, 02:48

General

  • Target

    ae78def10ada2b71d0c5576c8276e260_NEIKI.exe

  • Size

    119KB

  • MD5

    ae78def10ada2b71d0c5576c8276e260

  • SHA1

    22d9851cbe20016b48597bd052afc6d6579a6a80

  • SHA256

    a71fd968f8907f19eaf91cd354fcacb7829d138f185296ac24761ef070ddf4d3

  • SHA512

    eb557c61be8c45442d7982acf98def0263459a4957f9a69a63fb6685e6019d1a362379c174391a30e537ccf9bf8c6fa330a99ad55271c32b21f251eaf6f37470

  • SSDEEP

    3072:+nyiQSo1EZGtKgZGtK/PgtU1wAIuZAIu4:JiQSo1EZGtKgZGtK/CAIuZAIu4

Score
9/10

Malware Config

Signatures

  • Renames multiple (3439) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ae78def10ada2b71d0c5576c8276e260_NEIKI.exe
    "C:\Users\Admin\AppData\Local\Temp\ae78def10ada2b71d0c5576c8276e260_NEIKI.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2876

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-3452737119-3959686427-228443150-1000\desktop.ini.tmp

          Filesize

          119KB

          MD5

          6983d9bbf87f922dc6c8df7eb844fc97

          SHA1

          db9a0156085a281010b7e765d7ada6ff371c0623

          SHA256

          11fbd0d73de1d16df61cc308f765ec4deaf9749f969ad9a0caa1940b4a615f5a

          SHA512

          6fc9c84e2b2435c7a9177db8a9918a55b8246e2ca3576ecefd63544be68592d310e84c583d348e5e79c627131951cf8cb4fe65ccf9fd08a310177029fb47370d

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          128KB

          MD5

          b318ad999195f973442166d6c02264d1

          SHA1

          fa1c1cbf14921693e6b656d8189cea0d786684be

          SHA256

          17aa8dbdf65878c068eb2e655c34a94415578ab605059a9a82d1cd8d9bf64e5b

          SHA512

          959d448e4c370c661ec1b127a60dd20993075668ae46c60fa87fe0480ee60e7e448a4920d754a81341eee7462bb3b5e999519b9c38dd23985e092e92842cb74f

        • memory/2876-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/2876-646-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB