Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-05-2024 19:57

General

  • Target

    2f473f08c5cf58ddd38da0b6f873bfc0_NEIKI.exe

  • Size

    247KB

  • MD5

    2f473f08c5cf58ddd38da0b6f873bfc0

  • SHA1

    0f4fbcf1e2012a9bb8fdd1264744345c15f2f154

  • SHA256

    b4b34264d0836a48f650baeb718aa06f91302a95313152a9bce6e0f1d2a6beed

  • SHA512

    d5e5a96ee8518c980225b06bd63581bad50b9d6b3542d87b46efae1070c1803e872f332ee95a065e45460c5d470f229a138bf46e2ee228a435f5d55ecec41b56

  • SSDEEP

    3072:6e7WpHIyRF9ESWu0SWuDmSXrwcysSSw9mHpKZNGCLOwstyhZFChcssc56FUrgxvI:RqlIyFESWu0SWuTSh9UpK7ShcHUaZ0

Score
9/10

Malware Config

Signatures

  • Renames multiple (4831) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2f473f08c5cf58ddd38da0b6f873bfc0_NEIKI.exe
    "C:\Users\Admin\AppData\Local\Temp\2f473f08c5cf58ddd38da0b6f873bfc0_NEIKI.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:1940
    • C:\Windows\SysWOW64\Zombie.exe
      "C:\Windows\system32\Zombie.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      PID:5040
    • C:\Users\Admin\AppData\Local\Temp\_cinst.exe
      "_cinst.exe"
      2⤵
      • Executes dropped EXE
      PID:2744

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3571316656-3665257725-2415531812-1000\desktop.ini.exe

    Filesize

    105KB

    MD5

    148ac1f1aeba355965fbe2f30f111b28

    SHA1

    12362d82c595bcde7f832d5aeced70cd75f074d2

    SHA256

    a2473cdb8575f68b6eeb75865ad61540aa557dc75089f9227ecad19a10236c0e

    SHA512

    a42b87a06209ea20f98ff8d108ff8c01673ebe9a5d4e33fc2c914bc2a7a46c543e3b59838b8267d4445ec11a83d39ac66b9efb1019fed90f8777b54f1f4339d2

  • C:\Users\Admin\AppData\Local\Temp\_cinst.exe

    Filesize

    143KB

    MD5

    2fdb371d45181dff59577110ba1064e2

    SHA1

    42a5833cb0ac90e38d734d1327bb3f7c7a6aa453

    SHA256

    80d7ec8ce3913d81ea5d4f304b8609e56f0e49778c52af9279e742ea54f4a155

    SHA512

    52982041ba9ca552b90b79b251501ec6c33c5251d09ca9969a1b179af2ec17aca6eb81db6e588e12751bcea04208e1da8d5a754a979dd98ceb3f50780aadea20

  • C:\Windows\SysWOW64\Zombie.exe

    Filesize

    104KB

    MD5

    3cd001c929674ac992bd180f9ebf49ae

    SHA1

    c921f08d5eb02e27fcc04be5a9abab434bff14e7

    SHA256

    cd9598f195cd63c3f24d3457fa0f400cdeae1a140312972e5975e4d3ab65783d

    SHA512

    81eb0d8d7ffa0985ec50d95832c3ba4a6a858e3f2ca947e4c1c8c6189a1489ad55b01e409245b0dc1623b0ca88707ca06dbdbfc000a85c70c8aff37e351ba4a0

  • memory/2744-17-0x00007FFBF4693000-0x00007FFBF4695000-memory.dmp

    Filesize

    8KB

  • memory/2744-18-0x0000000000DD0000-0x0000000000DF8000-memory.dmp

    Filesize

    160KB