Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    12/05/2024, 21:11

General

  • Target

    5d2f52c087e9c7c4ef00226461c8dfc0_NeikiAnalytics.exe

  • Size

    253KB

  • MD5

    5d2f52c087e9c7c4ef00226461c8dfc0

  • SHA1

    2e20f3d7dfa40208455fe320d07da74de50a355d

  • SHA256

    399c6e6444b9a7a8b55a005909185930d72d7bbadcc128adc8b09b7959eeb7ee

  • SHA512

    076e759cc5d865dab3d50c876adfb5cbbc80ec2508006f0900c17efdea3c55c4159bd4636df0472dad71042865a24f53212b684cc955aabe979864c48133bad5

  • SSDEEP

    3072:6QWpqe+ejXrS791HpKIqGCLOwstyhZFChcssc56FUrgxvbSD4UQrO23xl:WEe+eXO9xpKbShcHUar

Score
9/10

Malware Config

Signatures

  • Renames multiple (564) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5d2f52c087e9c7c4ef00226461c8dfc0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\5d2f52c087e9c7c4ef00226461c8dfc0_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:1612
    • C:\Windows\SysWOW64\Zombie.exe
      "C:\Windows\system32\Zombie.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      PID:2300
    • C:\Users\Admin\AppData\Local\Temp\_cuninst.exe
      "_cuninst.exe"
      2⤵
      • Executes dropped EXE
      PID:2084

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-330940541-141609230-1670313778-1000\desktop.ini.tmp

    Filesize

    110KB

    MD5

    66d5352706c5edd942d30c4d019514fd

    SHA1

    36b02a0a3fdcdf93938d9f2518ce4b000be83205

    SHA256

    6b103f045a8a587f7ca7239f1cc0abf9d65b0561b95dbfccdb7e35de7d0b35b0

    SHA512

    3cf810c21d5054014b32b111aa0fcaa51da8f29fa52fceb51268d7ec38fc02e62f307cecc4c0b1d55bb576441187b770b6b732a8d3b37a42c3f36127cb5146b4

  • \Users\Admin\AppData\Local\Temp\_cuninst.exe

    Filesize

    143KB

    MD5

    7f9f981d970cbccece6ff126ab309045

    SHA1

    950a14dc6b636237c2f158cce02076b1a1b371e0

    SHA256

    82596d7d86d685087965457c297973c2aa1fbff0f6a0a3b8d8760f1cc65105cf

    SHA512

    ac59a2c6bc3b6fad47bac83d84336387b03b45d186c5d021f3c57c7fb160491e8344923d4978e50fb37f6c37e45bbb9c0f9b7cd4b93506ff571c82b795c6fb47

  • \Windows\SysWOW64\Zombie.exe

    Filesize

    110KB

    MD5

    c526c2e9c3b6a821801040d2f2411f52

    SHA1

    000290ab78a1267fcd3b633752c4429a9070006f

    SHA256

    4b8af4ed2e3481abaf4f3086cf0a64297e42f25109a242fc8c36116fdf5bfcf6

    SHA512

    e3f9b53dcc6fa7828c96a48f7cdf05fe97d5d3bb77a2115fd14d1a37df64fe19411c64d5b1686ad9d783af3aa69afef25c727055bb01d57294ed36e5a1b05e58

  • memory/2084-19-0x000007FEF5063000-0x000007FEF5064000-memory.dmp

    Filesize

    4KB

  • memory/2084-20-0x0000000001270000-0x0000000001298000-memory.dmp

    Filesize

    160KB