Analysis

  • max time kernel
    150s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-05-2024 06:34

General

  • Target

    9520899231aec17bb37583fd4db24c70_NeikiAnalytics.exe

  • Size

    271KB

  • MD5

    9520899231aec17bb37583fd4db24c70

  • SHA1

    c36b30e4a1e43a1953733f8a6d548f167f1ce621

  • SHA256

    9390771bb76035909006cd86e22a96a2eaa665c9b2fc47f9b22eb445a1f2bbd8

  • SHA512

    ad56d6ad15db02abc8a599bbb27cf44f294aa43f0d309c4d559f11e44be2f6226d5536c6cb2b1c4ca14a56911d89ad3439f5266dcdb6c4c667b5b03336bf1aae

  • SSDEEP

    3072:9QWpngTJdwJdpE9tHpKrvGCLOwstyhZFChcssc56FUrgxvbSD4UQrO2Exi:LVgV95pK7ShcHUad

Score
9/10

Malware Config

Signatures

  • Renames multiple (4906) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9520899231aec17bb37583fd4db24c70_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\9520899231aec17bb37583fd4db24c70_NeikiAnalytics.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:4456
    • C:\Users\Admin\AppData\Local\Temp\_clist.exe
      "_clist.exe"
      2⤵
      • Executes dropped EXE
      PID:436
    • C:\Windows\SysWOW64\Zombie.exe
      "C:\Windows\system32\Zombie.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      PID:4900

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2539840389-1261165778-1087677076-1000\desktop.ini.exe

    Filesize

    128KB

    MD5

    6d337e2b835168e2b4c57a191ef46d5d

    SHA1

    b8da27a789c7fc4d7f17e72107281ad7b00fa8ca

    SHA256

    bb96063723dcacda4af4474fb01b816a16d948e2fb8f3ba3d86467f1073a34c9

    SHA512

    f67c0a4fe674914a782c395573da2ef0db4011dd9b85054315dacaf75e7f96d9714d769b1f4ac1b2af17e1286760f3e045725ca0f53696aa416fc2c9ec56186e

  • C:\Users\Admin\AppData\Local\Temp\_clist.exe

    Filesize

    143KB

    MD5

    b27ea830fb39bc056e65f9a2260ae216

    SHA1

    b69e40ee5cabe0721d2d1e9fbdd4088fd87592d6

    SHA256

    fb7fab836f744d669451dcd38aa7d2a9c74c6af893c258d079439b58abce70d8

    SHA512

    22cad79d90a949174828ee5e3ce621113591c7c991c55c1a6a44a4555002adeb3bcbd9bab6cfbbfdefd663b76ac2dae96d70a01c527b312c7e8d223334a30219

  • C:\Windows\SysWOW64\Zombie.exe

    Filesize

    128KB

    MD5

    6e47167afecfbecd98613cdfc69699de

    SHA1

    80634698ca65811bf0fa3d1e68d8939789d06a4d

    SHA256

    9ec5b4582552cc2c4e9b6b8a61ea08e12cc082a4c4135ef0651aec7cbe4ae674

    SHA512

    eb43685a4b63307555c379af4b812dc2b0b0ab6dc5d8f07d30fa733296f2758896bdbb425e44dd1231d99ab95c18a806f1e57204b3df701dd32ce362c016becd

  • memory/436-23-0x00007FFFE9CF3000-0x00007FFFE9CF5000-memory.dmp

    Filesize

    8KB

  • memory/436-24-0x0000000000D10000-0x0000000000D38000-memory.dmp

    Filesize

    160KB

  • memory/4456-0-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/4900-10-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB