Analysis

  • max time kernel
    150s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/05/2024, 08:12

General

  • Target

    224c435737082bde6ddd2a8dd500c720_NEIKI.exe

  • Size

    133KB

  • MD5

    224c435737082bde6ddd2a8dd500c720

  • SHA1

    6d7d7acb32d87d87e747ad9752a031e8cfd66f65

  • SHA256

    237dc273f905a1f6f3643e83fc5388d05fe5533b9421c23697a541a794480f15

  • SHA512

    cc46051b5dc7985d25c0518743d83a37c5bb5ae19c32347d9a5f599d4736025ff6a9a62a051fa6ed235bd8a5709af4a1a391bd3b3a9fb55de30242c15c852029

  • SSDEEP

    3072:+nymCAIuZAIuYSMjoqtMHfhf7H0WH0rnb:JmCAIuZAIuDMVtM/1H0WH0P

Score
9/10

Malware Config

Signatures

  • Renames multiple (4847) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\224c435737082bde6ddd2a8dd500c720_NEIKI.exe
    "C:\Users\Admin\AppData\Local\Temp\224c435737082bde6ddd2a8dd500c720_NEIKI.exe"
    1⤵
    • Drops file in Program Files directory
    PID:3584

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-877519540-908060166-1852957295-1000\desktop.ini.tmp

          Filesize

          133KB

          MD5

          425a5d87a3c2071a628de6cb5bc5da66

          SHA1

          8914d294cc86a837225a6838056038ea875319c6

          SHA256

          5d37df95d1a97248ffbb80f5dabd89871c7dd7b2cedbdaf45060936aa3252e7c

          SHA512

          6a23a615c880236e140af07c18a1b54fc84a149bfd9e1159d6aae34c70defc1e38605918f490fdf51393dadf3141b8ae4a8984f3c5201acd068eb6a500d9141a

        • C:\Program Files\7-Zip\7-zip.dll.tmp

          Filesize

          232KB

          MD5

          5e0dc9dfb2abe2a9efb92ac376ef2586

          SHA1

          ad7d678a2a13657a31ca63ff4a76759a7478d5aa

          SHA256

          6a0f02967873cf19e4b1f77d2fcc6663c097a367f94fed6e236d4c004bc11eff

          SHA512

          bdd223840ad0ffc136e22f47fe0ef29a6097ba7c6b3bd74f2a2638325d6ecacfc154a002a076c9586f8aa88ffe041858c736b6c88cdeb0bf89b43596eb5c9889

        • memory/3584-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/3584-1682-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB