Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 04:33
Behavioral task
behavioral1
Sample
a8238560a26002ca69435c74e9625ff0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a8238560a26002ca69435c74e9625ff0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
a8238560a26002ca69435c74e9625ff0_NeikiAnalytics.exe
-
Size
80KB
-
MD5
a8238560a26002ca69435c74e9625ff0
-
SHA1
20feba6805079870490e84aa9cedf196eb825441
-
SHA256
c76ac0f265edb1a6e0c86e7458c04adc6dadbd18edcebcc5be807fe39d0385e6
-
SHA512
a449e20eb8ac51068630c2981e055a36ceefbc981904003dbb2fa3092775a259abab3d6bb8d0180b48e746eefb53c25d6ad63dc139c752670cef0df5f022cb8f
-
SSDEEP
1536:CTWn1++PJHJXA/OsIZfzc3/Q8wr0ARZF6NFVogjQlRv/Lq:KQSoMwUhQ7Xu
Malware Config
Signatures
-
Renames multiple (3718) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 2 IoCs
Processes:
_checksum.exeZombie.exepid process 1796 _checksum.exe 2832 Zombie.exe -
Loads dropped DLL 3 IoCs
Processes:
a8238560a26002ca69435c74e9625ff0_NeikiAnalytics.exepid process 2244 a8238560a26002ca69435c74e9625ff0_NeikiAnalytics.exe 2244 a8238560a26002ca69435c74e9625ff0_NeikiAnalytics.exe 2244 a8238560a26002ca69435c74e9625ff0_NeikiAnalytics.exe -
Processes:
resource yara_rule behavioral1/memory/2244-0-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/memory/2244-9-0x00000000003E0000-0x00000000003EA000-memory.dmp upx \Windows\SysWOW64\Zombie.exe upx behavioral1/memory/2244-17-0x00000000003E0000-0x00000000003EA000-memory.dmp upx C:\$Recycle.Bin\S-1-5-21-2737914667-933161113-3798636211-1000\desktop.ini.tmp upx behavioral1/memory/2244-25-0x0000000000400000-0x000000000040A000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
Processes:
a8238560a26002ca69435c74e9625ff0_NeikiAnalytics.exedescription ioc process File created C:\Windows\SysWOW64\Zombie.exe a8238560a26002ca69435c74e9625ff0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\Zombie.exe a8238560a26002ca69435c74e9625ff0_NeikiAnalytics.exe -
Drops file in Program Files directory 64 IoCs
Processes:
Zombie.exedescription ioc process File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\core\locale\org-openide-filesystems_zh_CN.jar.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-host-remote_zh_CN.jar.tmp Zombie.exe File created C:\Program Files\VideoLAN\VLC\plugins\codec\libd3d11va_plugin.dll.tmp Zombie.exe File created C:\Program Files\VideoLAN\VLC\plugins\demux\libimage_plugin.dll.tmp Zombie.exe File created C:\Program Files\Windows Photo Viewer\ja-JP\ImagingDevices.exe.mui.tmp Zombie.exe File created C:\Program Files\DVD Maker\en-US\DVDMaker.exe.mui.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.workbench.nl_zh_4.4.0.v20140623020002.jar.tmp Zombie.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\System.ServiceModel.Resources.dll.tmp Zombie.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\settings.html.tmp Zombie.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\en-US\css\settings.css.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\plugin.xml.tmp Zombie.exe File created C:\Program Files\Java\jre7\lib\zi\Pacific\Bougainville.tmp Zombie.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\es-ES\gadget.xml.tmp Zombie.exe File created C:\Program Files (x86)\Common Files\microsoft shared\DAO\dao360.dll.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Push\push_item.png.tmp Zombie.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\System.Data.Linq.Resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jre7\lib\zi\America\Noronha.tmp Zombie.exe File created C:\Program Files\Microsoft Office\Office14\MSOHEVI.DLL.tmp Zombie.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\cronometer.png.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Push\NavigationLeft_SelectionSubpicture.png.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-modules-javahelp.jar.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-jmx_ja.jar.tmp Zombie.exe File created C:\Program Files\Java\jre7\lib\zi\America\Curacao.tmp Zombie.exe File created C:\Program Files\Java\jre7\lib\zi\Europe\Andorra.tmp Zombie.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\images\delete_up.png.tmp Zombie.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\rt3d.dll.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\tipresx.dll.mui.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\schema\com.jrockit.mc.rjmx.attributeTransformation.exsd.tmp Zombie.exe File created C:\Program Files\Java\jre7\lib\zi\Indian\Reunion.tmp Zombie.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\40.png.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ipssrl.xml.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-modules-profiler-selector-ui_ja.jar.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\license.html.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\locale\org-openide-util_ja.jar.tmp Zombie.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\bear_formatted_matte2.wmv.tmp Zombie.exe File created C:\Program Files\VideoLAN\VLC\uninstall.exe.tmp Zombie.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\it-IT\gadget.xml.tmp Zombie.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\MyriadPro-Regular.otf.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ipsdan.xml.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\sk-SK\tipresx.dll.mui.tmp Zombie.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\System.Management.Instrumentation.dll.tmp Zombie.exe File created C:\Program Files\VideoLAN\VLC\plugins\video_filter\libhqdn3d_plugin.dll.tmp Zombie.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\icon.png.tmp Zombie.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\reveal_rest.png.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\db\bin\ij.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\org-netbeans-modules-profiler-heapwalker.xml.tmp Zombie.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\system_settings.png.tmp Zombie.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\A3DUtility.exe.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\zh-CN.pak.tmp Zombie.exe File created C:\Program Files\Windows Photo Viewer\de-DE\PhotoAcq.dll.mui.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Indiana\Knox.tmp Zombie.exe File created C:\Program Files\Java\jre7\lib\zi\Europe\Tirane.tmp Zombie.exe File created C:\Program Files\Microsoft Office\Office14\URLREDIR.DLL.tmp Zombie.exe File created C:\Program Files\VideoLAN\VLC\plugins\stream_filter\libhds_plugin.dll.tmp Zombie.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\eula.ini.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\tipresx.dll.mui.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Blanc-Sablon.tmp Zombie.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\winXPTSFrame.png.tmp Zombie.exe File created C:\Program Files\Java\jre7\lib\zi\Pacific\Guadalcanal.tmp Zombie.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\TipBand.dll.mui.tmp Zombie.exe File created C:\Program Files\Common Files\System\Ole DB\msdatl3.dll.tmp Zombie.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\System.Data.Services.dll.tmp Zombie.exe File created C:\Program Files\VideoLAN\VLC\plugins\demux\libnsv_plugin.dll.tmp Zombie.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\PDDom.api.tmp Zombie.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
a8238560a26002ca69435c74e9625ff0_NeikiAnalytics.exedescription pid process target process PID 2244 wrote to memory of 1796 2244 a8238560a26002ca69435c74e9625ff0_NeikiAnalytics.exe _checksum.exe PID 2244 wrote to memory of 1796 2244 a8238560a26002ca69435c74e9625ff0_NeikiAnalytics.exe _checksum.exe PID 2244 wrote to memory of 1796 2244 a8238560a26002ca69435c74e9625ff0_NeikiAnalytics.exe _checksum.exe PID 2244 wrote to memory of 1796 2244 a8238560a26002ca69435c74e9625ff0_NeikiAnalytics.exe _checksum.exe PID 2244 wrote to memory of 2832 2244 a8238560a26002ca69435c74e9625ff0_NeikiAnalytics.exe Zombie.exe PID 2244 wrote to memory of 2832 2244 a8238560a26002ca69435c74e9625ff0_NeikiAnalytics.exe Zombie.exe PID 2244 wrote to memory of 2832 2244 a8238560a26002ca69435c74e9625ff0_NeikiAnalytics.exe Zombie.exe PID 2244 wrote to memory of 2832 2244 a8238560a26002ca69435c74e9625ff0_NeikiAnalytics.exe Zombie.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8238560a26002ca69435c74e9625ff0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\a8238560a26002ca69435c74e9625ff0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\_checksum.exe"_checksum.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\Zombie.exe"C:\Windows\system32\Zombie.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\$Recycle.Bin\S-1-5-21-2737914667-933161113-3798636211-1000\desktop.ini.tmpFilesize
45KB
MD59513b6758f17a7d00e8f3ce68eda7f68
SHA1eba813f8ee2595453bd09da98e5bf0888a0f013c
SHA25622d632f0303d00da6adbd0738eb3208af3b926912f9e892f10fae68d2f40c960
SHA51240c1d37480ecc5a23f7e9c58f9dd630133af342cd42d64a9f6038f058f87b1ed02cfd6ccd4dee6d5e16f9746ff79f51c478d26417847b23db96ead85c36c91ad
-
\Users\Admin\AppData\Local\Temp\_checksum.exeFilesize
35KB
MD523f049f14ca0e68af4b9883514791dfe
SHA11224ecfda221e54d4536a4ac102a56235320ee25
SHA2569562aabe1f71d7ff5ec879fd2fb5cfe4be2c8f62a7fa5a1aa49660c3a495f1fb
SHA512ce91cd089a299ba88f047cf15fd06673389942dabbf8be5bf2e2666e1048bc6da261ce30cae1e2ecb3b50392441a335bf97cc4ed51540554bedabe65590be677
-
\Windows\SysWOW64\Zombie.exeFilesize
44KB
MD50ce45d93e687951f556b7fc0db6f020c
SHA13feb677dc28d77ee94fc8783597524cc89e5ad73
SHA256c0dcd5359d24c256b36c799da7fc982348b73f2e36783e4995c1a6d2c6b44013
SHA5129c2c33b503b592c9a7d668dd00cac4f3abaa38e0a78f334167ecae33d419187e475968d53ccf0d0b882b9250551fe20b7f5aa21bffa825b9a7f8c2f043d0b970
-
memory/1796-19-0x000007FEF5563000-0x000007FEF5564000-memory.dmpFilesize
4KB
-
memory/1796-23-0x0000000000C30000-0x0000000000C3E000-memory.dmpFilesize
56KB
-
memory/1796-28-0x000007FEF5560000-0x000007FEF5F4C000-memory.dmpFilesize
9.9MB
-
memory/2244-0-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/2244-9-0x00000000003E0000-0x00000000003EA000-memory.dmpFilesize
40KB
-
memory/2244-17-0x00000000003E0000-0x00000000003EA000-memory.dmpFilesize
40KB
-
memory/2244-25-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB