Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    08-05-2024 08:12

General

  • Target

    224c435737082bde6ddd2a8dd500c720_NEIKI.exe

  • Size

    133KB

  • MD5

    224c435737082bde6ddd2a8dd500c720

  • SHA1

    6d7d7acb32d87d87e747ad9752a031e8cfd66f65

  • SHA256

    237dc273f905a1f6f3643e83fc5388d05fe5533b9421c23697a541a794480f15

  • SHA512

    cc46051b5dc7985d25c0518743d83a37c5bb5ae19c32347d9a5f599d4736025ff6a9a62a051fa6ed235bd8a5709af4a1a391bd3b3a9fb55de30242c15c852029

  • SSDEEP

    3072:+nymCAIuZAIuYSMjoqtMHfhf7H0WH0rnb:JmCAIuZAIuDMVtM/1H0WH0P

Score
9/10

Malware Config

Signatures

  • Renames multiple (3430) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\224c435737082bde6ddd2a8dd500c720_NEIKI.exe
    "C:\Users\Admin\AppData\Local\Temp\224c435737082bde6ddd2a8dd500c720_NEIKI.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2220

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3627615824-4061627003-3019543961-1000\desktop.ini.tmp

    Filesize

    133KB

    MD5

    201f94d7cc8d473b9389c78f29c16bc7

    SHA1

    00e0c31eb9a8dc7cc3696d50daa0740a520fbd50

    SHA256

    04c4ddedda0c17495b265e1235adef0c6ef2d681c0c432af189f80d61fd7f718

    SHA512

    79bc248fcd40506c90d949b7010602b854558be9ddc5d3517e9c33fc88313908aee2bdda30dcad1701601b1b4960ca2010ff9e4580bfe6ac5d06c6ad03f31da9

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    142KB

    MD5

    d592d322bcd939eb287cd0ae82ebac8f

    SHA1

    a73f509f8808f287608d0c5367ca0626b87cfb08

    SHA256

    84c5a0beaa0930d43b71962cc71d3918d837377d4c580972db2ce291d1417d25

    SHA512

    d5440a5b74684ae3a6acf9618e9ddeff57c81a0610b94fc0e4c4d3c0328027ac0736e6ee40e6ab721e6b98ac6ea135661861958ce501ea5d1d4a779cfe169ffa

  • memory/2220-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2220-636-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB