Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 06:34
Static task
static1
Behavioral task
behavioral1
Sample
9520899231aec17bb37583fd4db24c70_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
9520899231aec17bb37583fd4db24c70_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
9520899231aec17bb37583fd4db24c70_NeikiAnalytics.exe
-
Size
271KB
-
MD5
9520899231aec17bb37583fd4db24c70
-
SHA1
c36b30e4a1e43a1953733f8a6d548f167f1ce621
-
SHA256
9390771bb76035909006cd86e22a96a2eaa665c9b2fc47f9b22eb445a1f2bbd8
-
SHA512
ad56d6ad15db02abc8a599bbb27cf44f294aa43f0d309c4d559f11e44be2f6226d5536c6cb2b1c4ca14a56911d89ad3439f5266dcdb6c4c667b5b03336bf1aae
-
SSDEEP
3072:9QWpngTJdwJdpE9tHpKrvGCLOwstyhZFChcssc56FUrgxvbSD4UQrO2Exi:LVgV95pK7ShcHUad
Malware Config
Signatures
-
Renames multiple (3431) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 2 IoCs
pid Process 2168 _clist.exe 2380 Zombie.exe -
Loads dropped DLL 3 IoCs
pid Process 2040 9520899231aec17bb37583fd4db24c70_NeikiAnalytics.exe 2040 9520899231aec17bb37583fd4db24c70_NeikiAnalytics.exe 2040 9520899231aec17bb37583fd4db24c70_NeikiAnalytics.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Zombie.exe 9520899231aec17bb37583fd4db24c70_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\Zombie.exe 9520899231aec17bb37583fd4db24c70_NeikiAnalytics.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\7-Zip\Lang\el.txt.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Ho_Chi_Minh.tmp Zombie.exe File created C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libtrivial_channel_mixer_plugin.dll.tmp Zombie.exe File created C:\Program Files\Windows Media Player\WMPNSSUI.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\javafx-iio.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.osgi.nl_zh_4.4.0.v20140623020002.jar.tmp Zombie.exe File created C:\Program Files\Java\jre7\lib\zi\Etc\GMT+5.tmp Zombie.exe File created C:\Program Files\Microsoft Games\Multiplayer\Spades\Shvl.dll.tmp Zombie.exe File created C:\Program Files\VideoLAN\VLC\lua\playlist\anevia_streams.luac.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ipsfra.xml.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\images\cursors\cursors.properties.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Danmarkshavn.tmp Zombie.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\de\System.Data.Linq.Resources.dll.tmp Zombie.exe File created C:\Program Files\VideoLAN\VLC\plugins\codec\liboggspots_plugin.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\security\javaws.policy.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.intro.nl_zh_4.4.0.v20140623020002.jar.tmp Zombie.exe File created C:\Program Files\VideoLAN\VLC\libvlccore.dll.tmp Zombie.exe File created C:\Program Files\VideoLAN\VLC\plugins\audio_output\libamem_plugin.dll.tmp Zombie.exe File created C:\Program Files\VideoLAN\VLC\plugins\stream_out\libstream_out_es_plugin.dll.tmp Zombie.exe File created C:\Program Files\Windows Media Player\fr-FR\wmpnssui.dll.mui.tmp Zombie.exe File created C:\Program Files\Java\jre7\lib\zi\America\Porto_Velho.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\InputPersonalization.exe.mui.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\TipBand.dll.tmp Zombie.exe File created C:\Program Files\Internet Explorer\DiagnosticsHub.DataWarehouse.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT-14.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.forms_3.6.100.v20140422-1825.jar.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-openide-actions.jar.tmp Zombie.exe File created C:\Program Files\VideoLAN\VLC\lua\playlist\dailymotion.luac.tmp Zombie.exe File created C:\Program Files\VideoLAN\VLC\plugins\codec\libtheora_plugin.dll.tmp Zombie.exe File created C:\Program Files\VideoLAN\VLC\plugins\text_renderer\libsapi_plugin.dll.tmp Zombie.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\de\System.Windows.Presentation.resources.dll.tmp Zombie.exe File created C:\Program Files\DVD Maker\bod_r.TTF.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\NavigationUp_ButtonGraphic.png.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_wer.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\server\classes.jsa.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.touchpoint.natives.nl_ja_4.4.0.v20140623020002.jar.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\locale\org-openide-util_ja.jar.tmp Zombie.exe File created C:\Program Files\Java\jre7\bin\t2k.dll.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\IpsMigrationPlugin.dll.mui.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Etc\GMT-7.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-actions_ja.jar.tmp Zombie.exe File created C:\Program Files\Java\jre7\lib\zi\America\Port_of_Spain.tmp Zombie.exe File created C:\Program Files\Mozilla Firefox\AccessibleHandler.dll.tmp Zombie.exe File created C:\Program Files\VideoLAN\VLC\plugins\audio_output\libwaveout_plugin.dll.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\en-US\TipTsf.dll.mui.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\Stationery\Shades of Blue.htm.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Sao_Paulo.tmp Zombie.exe File created C:\Program Files\Windows Journal\jnwdui.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-lib-profiler_zh_CN.jar.tmp Zombie.exe File created C:\Program Files\Java\jre7\lib\zi\Asia\Dushanbe.tmp Zombie.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\es\UIAutomationClientsideProviders.resources.dll.tmp Zombie.exe File created C:\Program Files\VideoLAN\VLC\lua\http\images\Audio-48.png.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\db\lib\derbyLocale_zh_TW.jar.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\sunmscapi.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\plugin.jar.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Tegucigalpa.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Kiev.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-core-output2_zh_CN.jar.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-core-io-ui.jar.tmp Zombie.exe File created C:\Program Files\Windows NT\Accessories\en-US\wordpad.exe.mui.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\Stationery\Pretty_Peacock.jpg.tmp Zombie.exe File created C:\Program Files\DVD Maker\Pipeline.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.help_2.0.102.v20141007-2301\license.html.tmp Zombie.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2168 2040 9520899231aec17bb37583fd4db24c70_NeikiAnalytics.exe 28 PID 2040 wrote to memory of 2168 2040 9520899231aec17bb37583fd4db24c70_NeikiAnalytics.exe 28 PID 2040 wrote to memory of 2168 2040 9520899231aec17bb37583fd4db24c70_NeikiAnalytics.exe 28 PID 2040 wrote to memory of 2168 2040 9520899231aec17bb37583fd4db24c70_NeikiAnalytics.exe 28 PID 2040 wrote to memory of 2380 2040 9520899231aec17bb37583fd4db24c70_NeikiAnalytics.exe 30 PID 2040 wrote to memory of 2380 2040 9520899231aec17bb37583fd4db24c70_NeikiAnalytics.exe 30 PID 2040 wrote to memory of 2380 2040 9520899231aec17bb37583fd4db24c70_NeikiAnalytics.exe 30 PID 2040 wrote to memory of 2380 2040 9520899231aec17bb37583fd4db24c70_NeikiAnalytics.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\9520899231aec17bb37583fd4db24c70_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\9520899231aec17bb37583fd4db24c70_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\_clist.exe"_clist.exe"2⤵
- Executes dropped EXE
PID:2168
-
-
C:\Windows\SysWOW64\Zombie.exe"C:\Windows\system32\Zombie.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2380
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD539065ad918841f30c411d69c029aae1a
SHA1601c4d82db452f4e68790a7f9fb3fb57c3f05898
SHA256abf0e60debe87bba715f7f61942e341a16c28b2a4ca5a17055e1f8e91516049c
SHA512cd44aa49aedc36cecddfbd005b0022809ae24fdc6a4fde221e421277723639be2529250e0b663a5474a3a14a3afa4794cf63158ed4b13e6bc56a9bf2ced48b7e
-
Filesize
143KB
MD5b27ea830fb39bc056e65f9a2260ae216
SHA1b69e40ee5cabe0721d2d1e9fbdd4088fd87592d6
SHA256fb7fab836f744d669451dcd38aa7d2a9c74c6af893c258d079439b58abce70d8
SHA51222cad79d90a949174828ee5e3ce621113591c7c991c55c1a6a44a4555002adeb3bcbd9bab6cfbbfdefd663b76ac2dae96d70a01c527b312c7e8d223334a30219
-
Filesize
128KB
MD56e47167afecfbecd98613cdfc69699de
SHA180634698ca65811bf0fa3d1e68d8939789d06a4d
SHA2569ec5b4582552cc2c4e9b6b8a61ea08e12cc082a4c4135ef0651aec7cbe4ae674
SHA512eb43685a4b63307555c379af4b812dc2b0b0ab6dc5d8f07d30fa733296f2758896bdbb425e44dd1231d99ab95c18a806f1e57204b3df701dd32ce362c016becd