Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    08-05-2024 15:25

General

  • Target

    edf9c39840cd372a1f95082139bf8dd0_NEIKI.exe

  • Size

    177KB

  • MD5

    edf9c39840cd372a1f95082139bf8dd0

  • SHA1

    31daa858390c5e9c0f2e35b875d117ec00d0febe

  • SHA256

    613026096ee507d13ba47ecb64f5ede49f1b85a190c2d9d0838df233f3817c45

  • SHA512

    f1976f2dbecaf92e77a3d507ad7e55dccc249f0201279a14756dac7421fcae180e037c71ff28f8a7d6a195129eee9c3acd2c8669667a8e7c7b65c4da609818f4

  • SSDEEP

    3072:+nyiQSo1EZGtKgZGtK/PgtU1wAIuZAIu3:JiQSo1EZGtKgZGtK/CAIuZAIu3

Score
9/10

Malware Config

Signatures

  • Renames multiple (3238) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\edf9c39840cd372a1f95082139bf8dd0_NEIKI.exe
    "C:\Users\Admin\AppData\Local\Temp\edf9c39840cd372a1f95082139bf8dd0_NEIKI.exe"
    1⤵
    • Drops file in Program Files directory
    PID:1188

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2248906074-2862704502-246302768-1000\desktop.ini.tmp

    Filesize

    177KB

    MD5

    5efb0977189d6ccef8f30ba4895ea8f4

    SHA1

    452ac54f05a018c63ad60cced533973b6656d981

    SHA256

    b8a5eb3084c61e9a955fb3dc4f644c6f32a8377ae83e1c080795ce1e736288ed

    SHA512

    fc44aff4368e0af5c08af6836997cb6e0739c4a270f6e65a840e02937ceff64acc9fdae825ce404f8aee736e167bf365759acdc3f979c93e143b9deb3b59ae8c

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    186KB

    MD5

    0b210d77f412ae25821cae860e6ad129

    SHA1

    eb41c3c6ebcfd0e84c7e6ae9dbbe5127121646aa

    SHA256

    7ad2a4ce9c64925a4f452756c56076abcf3f0e515e50d8f6d624c537ba660820

    SHA512

    1579e4e47e227a72202803d77affd12e59349458f0ac7a2e07fd4c8e982d1bfa995e360a5eac702b1e931af0dadcfcac552b41198ca133629d014ac1f5d38074

  • memory/1188-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1188-540-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB