Analysis

  • max time kernel
    149s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    08/05/2024, 12:12

General

  • Target

    a4985bf53cef63521926b34dee36bb80_NEIKI.exe

  • Size

    167KB

  • MD5

    a4985bf53cef63521926b34dee36bb80

  • SHA1

    005aee95733ececa307e329d50e7ed9349dc2f28

  • SHA256

    c56059e1853e9a7d6fc643f675af48bf7fa4398ed76f09f3f1c72a540808ed57

  • SHA512

    6eeb9067aa1ffafadc1123b8ede71e25ddabb33d7448e3be30cdca4ef42ddd713693c22333d74bc19ebd379665e3ed158eb6419eab93012f9436c79abe0c1be7

  • SSDEEP

    3072:+nyiQSo1EZGtKgZGtK/PgtU1wAIuZAIu3:JiQSo1EZGtKgZGtK/CAIuZAIu3

Score
9/10

Malware Config

Signatures

  • Renames multiple (3369) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a4985bf53cef63521926b34dee36bb80_NEIKI.exe
    "C:\Users\Admin\AppData\Local\Temp\a4985bf53cef63521926b34dee36bb80_NEIKI.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2020

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2297530677-1229052932-2803917579-1000\desktop.ini.tmp

    Filesize

    167KB

    MD5

    b6324e9d389f1e4321d2462a1270026d

    SHA1

    1882c47569b45d3ee78d7302eb02153a8641b05b

    SHA256

    1e45a89d6678bb65275830eb39faf9fd0c5911fe64da6e55d866790766e46606

    SHA512

    5ee8546c99b82cc169ef97adc772ea9428ea86b80b56feed88d134648b3e5c9178a5c667f80469358b640468664103c63ab6cd0ff80117bb830604dbef71a80e

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    176KB

    MD5

    c6b67d85e0a8e9a5eef2544148662ef8

    SHA1

    0c63c2d61c0d20dfcf1be3f4988968cfa8e6e1c1

    SHA256

    b04171ac8f86c6ba99c5daef57998be56ac75e3b539ddf005528cf128b0513dd

    SHA512

    1639c93aa65bde6748b061866055b3c7d2988d044e3fe196341b392a3a011b6a51ae3e215a6ffa9de38b535ee7f0c1acbba47a3cd25220a48ee1da0d46dd1978

  • memory/2020-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2020-540-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB