Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 06:39
Static task
static1
Behavioral task
behavioral1
Sample
993be447de91493de6438970814c9400_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
993be447de91493de6438970814c9400_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
993be447de91493de6438970814c9400_NeikiAnalytics.exe
-
Size
3.8MB
-
MD5
993be447de91493de6438970814c9400
-
SHA1
e1ef9d4034308d5d5551c16e493708a44b78acc3
-
SHA256
f9ec5b807eed13641eda81591f5ea4f95996093f6343869f1444baef00e22cb4
-
SHA512
f1d3500ec27246e3a9416522caaf336ee46cfaeb1817a26061e1526e57be8a5e037187ff62f055bb8f75abd2797cfd2013d30d200a3ee2943a1651f5a08af2ef
-
SSDEEP
49152:3PxPlHcdXRyGWrP/OiFoNFRa6uahv3nmjTNYuUn89KOArxm7Kb6KvySgYnevXr:3PxP5YRfvhv30RYI9urj6KvySznej
Malware Config
Signatures
-
Renames multiple (5058) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 2 IoCs
pid Process 3860 Zombie.exe 4476 _NisSrv.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Zombie.exe 993be447de91493de6438970814c9400_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\Zombie.exe 993be447de91493de6438970814c9400_NeikiAnalytics.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Xml.XmlSerializer.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PersonalDemoR_BypassTrial180-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\MEDIA\EXPLODE.WAV.tmp Zombie.exe File created C:\Program Files\Common Files\System\Ole DB\ja-JP\msdasqlr.dll.mui.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\ja\WindowsBase.resources.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ExcelR_Retail-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeStudentR_OEM_Perp-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\GFX.DLL.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\GKExcel.dll.tmp Zombie.exe File created C:\Program Files\Common Files\System\Ole DB\es-ES\sqlxmlx.rll.mui.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\zh-Hans\UIAutomationClientSideProviders.resources.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_Subscription3-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusiness2019VL_KMS_Client_AE-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-crt-stdio-l1-1-0.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Collections.Concurrent.dll.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\lib\deploy\messages_zh_TW.properties.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\StandardVL_KMS_Client-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Microsoft.reportviewer.common.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogo.scale-80.png.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\MSIPCEvents.man.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Collections.NonGeneric.dll.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\ja-JP\InkObj.dll.mui.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-crt-utility-l1-1-0.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\es\PresentationFramework.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\fr\WindowsBase.resources.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_Subscription2-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\es-MX\tipresx.dll.mui.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL075.XML.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\System.Security.Permissions.dll.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\Microsoft.Ink.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\api-ms-win-core-file-l1-2-0.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_Subscription1-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Data.OData.Query.NetFX35.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.lv-lv.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Text.RegularExpressions.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\System.Diagnostics.EventLog.dll.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\lib\deploy\messages_it.properties.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Microsoft.AnalysisServices.Excel.BackEnd.XmlSerializers.dll.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.id-id.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Text.Encoding.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\cs\UIAutomationProvider.resources.dll.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\110.0.5481.104\Locales\ja.pak.tmp Zombie.exe File created C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-00C1-0409-1000-0000000FF1CE.xml.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Excel2019R_Trial-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\CancelFluent.White.png.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] Zombie.exe File created C:\Program Files\Common Files\System\ado\msador15.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.ComponentModel.Annotations.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Text.Encoding.CodePages.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Buffers.dll.tmp Zombie.exe File created C:\Program Files\Internet Explorer\ExtExport.exe.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\bin\ssv.dll.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\lib\jvm.hprof.txt.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PowerPoint2019VL_KMS_Client_AE-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_altgr.xml.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\WordVL_MAK-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Runtime.CompilerServices.Unsafe.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\de\UIAutomationProvider.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\api-ms-win-core-console-l1-2-0.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Publisher2019VL_MAK_AE-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\EduWorks Data Streamer Add-In\System.Runtime.InteropServices.RuntimeInformation.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\api-ms-win-crt-stdio-l1-1-0.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\OSFROAMINGPROXY.DLL.tmp Zombie.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4608 wrote to memory of 3860 4608 993be447de91493de6438970814c9400_NeikiAnalytics.exe 81 PID 4608 wrote to memory of 3860 4608 993be447de91493de6438970814c9400_NeikiAnalytics.exe 81 PID 4608 wrote to memory of 3860 4608 993be447de91493de6438970814c9400_NeikiAnalytics.exe 81 PID 4608 wrote to memory of 4476 4608 993be447de91493de6438970814c9400_NeikiAnalytics.exe 82 PID 4608 wrote to memory of 4476 4608 993be447de91493de6438970814c9400_NeikiAnalytics.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\993be447de91493de6438970814c9400_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\993be447de91493de6438970814c9400_NeikiAnalytics.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Windows\SysWOW64\Zombie.exe"C:\Windows\system32\Zombie.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:3860
-
-
C:\Users\Admin\AppData\Local\Temp\_NisSrv.exe"_NisSrv.exe"2⤵
- Executes dropped EXE
PID:4476
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD52b8c85eb961f4dfb1c1d0bd7ad61762e
SHA1b4cd897aeb1832d1d85804bef54ca48e59b3da25
SHA256cff89e2f3e51dbbd1dd46179b1e22d35570fc3d01e3ff0c8f246f67caa8c51b5
SHA5123255eedf9a67169289e23c0834e4da82e0d1046859dcd067f87386675a4bb89db77db58bb253297588b27c4f99ad0480946da6d0c06f2f4d3da684880cfb6553
-
Filesize
3.7MB
MD59a92286431ec4aad197d7f2f648969cb
SHA1ed0151ab257f291894f0c08a4502aa916ab4ed1d
SHA2560cd2301e27f4304c0eebdea61ccab03738425fbf174801a5baaf9dbd6b73c0d3
SHA512f5f18452628574604de07792abeee2996d9785ad978168da24090d3b4a4dcd7a2ab2f5988c8ef7d399f3a2be55d287dd10c861f79b2186ab4bd6753867d3faf4
-
Filesize
93KB
MD54eeac066694e29a0e913094e8e1fa546
SHA14c70c5f0d731abf2a7032424bf6013298e12d828
SHA256ba2af31646913642bdad104e8e44b3472597ad3e844c637f6e7f4e6918421bdf
SHA5128c3d783f6f482f18bc1a64e8e29d5baa75fd74c45fafcae15914be8b570c2216d320004212d3715bbc6f4517ab99fb1b25c705f0058dc8f676f9965cc1dba02a