Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 04:33
Behavioral task
behavioral1
Sample
a8238560a26002ca69435c74e9625ff0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a8238560a26002ca69435c74e9625ff0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
a8238560a26002ca69435c74e9625ff0_NeikiAnalytics.exe
-
Size
80KB
-
MD5
a8238560a26002ca69435c74e9625ff0
-
SHA1
20feba6805079870490e84aa9cedf196eb825441
-
SHA256
c76ac0f265edb1a6e0c86e7458c04adc6dadbd18edcebcc5be807fe39d0385e6
-
SHA512
a449e20eb8ac51068630c2981e055a36ceefbc981904003dbb2fa3092775a259abab3d6bb8d0180b48e746eefb53c25d6ad63dc139c752670cef0df5f022cb8f
-
SSDEEP
1536:CTWn1++PJHJXA/OsIZfzc3/Q8wr0ARZF6NFVogjQlRv/Lq:KQSoMwUhQ7Xu
Malware Config
Signatures
-
Renames multiple (5025) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 2 IoCs
Processes:
Zombie.exe_checksum.exepid process 1844 Zombie.exe 2692 _checksum.exe -
Processes:
resource yara_rule behavioral2/memory/1736-0-0x0000000000400000-0x000000000040A000-memory.dmp upx C:\Windows\SysWOW64\Zombie.exe upx C:\$Recycle.Bin\S-1-5-21-3571316656-3665257725-2415531812-1000\desktop.ini.exe upx behavioral2/memory/1736-34-0x0000000000400000-0x000000000040A000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
Processes:
a8238560a26002ca69435c74e9625ff0_NeikiAnalytics.exedescription ioc process File created C:\Windows\SysWOW64\Zombie.exe a8238560a26002ca69435c74e9625ff0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\Zombie.exe a8238560a26002ca69435c74e9625ff0_NeikiAnalytics.exe -
Drops file in Program Files directory 64 IoCs
Processes:
Zombie.exedescription ioc process File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\de\PresentationFramework.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\zh-Hant\System.Windows.Forms.Design.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\legal\jdk\cryptix.md.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectStd2019R_OEM_Perp-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStdO365R_Subscription-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Threading.Thread.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Excel2019R_OEM_Perp-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdR_Grace-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProMSDNR_Retail-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_Grace-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ko\UIAutomationTypes.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\unpack.dll.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\bin\jaas_nt.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ExcelR_Retail-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_Retail3-ul-phn.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTest1-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Runtime.Serialization.Xml.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019MSDNR_Retail-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\WINWORD_F_COL.HXK.tmp Zombie.exe File created C:\Program Files\7-Zip\Lang\th.txt.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\System.Security.Cryptography.ProtectedData.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ja\Microsoft.VisualBasic.Forms.resources.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusE5R_Subscription-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019XC2RVL_MAKC2R-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStd2019R_Retail-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\ja\System.Windows.Input.Manipulations.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\pl\System.Windows.Controls.Ribbon.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\pl\WindowsBase.resources.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Personal2019R_Retail-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectProXC2RVL_KMS_ClientC2R-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Shims.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Diagnostics.TraceSource.dll.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\110.0.5481.104\VisualElements\LogoBeta.png.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\dtplugin\npdeployJava1.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ExcelR_Trial-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeStudentR_Trial2-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\offreg.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\pl\System.Windows.Input.Manipulations.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\Microsoft.WindowsDesktop.App.runtimeconfig.json.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ru\PresentationFramework.resources.dll.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\110.0.5481.104\Locales\pt-BR.pak.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\accessibility.properties.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\PPCORE.DLL.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\PROOF\msgrammar8.dll.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\bin\api-ms-win-crt-string-l1-1-0.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ja\System.Windows.Input.Manipulations.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ru\Microsoft.VisualBasic.Forms.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\bin\prism_sw.dll.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\lib\security\blacklist.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Client\api-ms-win-crt-math-l1-1-0.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectStd2019R_Retail-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\cardview\lib\native-common\assets\[email protected] Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\Microsoft.DiaSymReader.Native.amd64.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ko\System.Windows.Controls.Ribbon.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\bin\servertool.exe.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_OEM_Perp2-ul-phn.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\EduWorks Data Streamer Add-In\DataStreamerLibrary.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL121.XML.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Reflection.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Drawing.Primitives.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\es\System.Xaml.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\w2k_lsa_auth.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\HintBarEllipses.16.GrayF.png.tmp Zombie.exe File created C:\Program Files\7-Zip\7-zip32.dll.tmp Zombie.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
a8238560a26002ca69435c74e9625ff0_NeikiAnalytics.exedescription pid process target process PID 1736 wrote to memory of 1844 1736 a8238560a26002ca69435c74e9625ff0_NeikiAnalytics.exe Zombie.exe PID 1736 wrote to memory of 1844 1736 a8238560a26002ca69435c74e9625ff0_NeikiAnalytics.exe Zombie.exe PID 1736 wrote to memory of 1844 1736 a8238560a26002ca69435c74e9625ff0_NeikiAnalytics.exe Zombie.exe PID 1736 wrote to memory of 2692 1736 a8238560a26002ca69435c74e9625ff0_NeikiAnalytics.exe _checksum.exe PID 1736 wrote to memory of 2692 1736 a8238560a26002ca69435c74e9625ff0_NeikiAnalytics.exe _checksum.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8238560a26002ca69435c74e9625ff0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\a8238560a26002ca69435c74e9625ff0_NeikiAnalytics.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Zombie.exe"C:\Windows\system32\Zombie.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Users\Admin\AppData\Local\Temp\_checksum.exe"_checksum.exe"2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\$Recycle.Bin\S-1-5-21-3571316656-3665257725-2415531812-1000\desktop.ini.exeFilesize
45KB
MD5812f8d3ee05d809e487eb0683d329072
SHA1d3891f61c9c8d306d9571fb7ab1dca67e8fb952d
SHA2562fad8fa6f9c18cefcceba257f534962025d7b524bd2aa74fca02822b0ab6d55f
SHA512c189b566d41840958e55518b0773f6f47031d82c65c7f5e57d7a8767b7f82d0998724f366057e89e937328f639e03e1dbe098824b44c3a515be61f721a3358f2
-
C:\Users\Admin\AppData\Local\Temp\_checksum.exeFilesize
35KB
MD523f049f14ca0e68af4b9883514791dfe
SHA11224ecfda221e54d4536a4ac102a56235320ee25
SHA2569562aabe1f71d7ff5ec879fd2fb5cfe4be2c8f62a7fa5a1aa49660c3a495f1fb
SHA512ce91cd089a299ba88f047cf15fd06673389942dabbf8be5bf2e2666e1048bc6da261ce30cae1e2ecb3b50392441a335bf97cc4ed51540554bedabe65590be677
-
C:\Windows\SysWOW64\Zombie.exeFilesize
44KB
MD50ce45d93e687951f556b7fc0db6f020c
SHA13feb677dc28d77ee94fc8783597524cc89e5ad73
SHA256c0dcd5359d24c256b36c799da7fc982348b73f2e36783e4995c1a6d2c6b44013
SHA5129c2c33b503b592c9a7d668dd00cac4f3abaa38e0a78f334167ecae33d419187e475968d53ccf0d0b882b9250551fe20b7f5aa21bffa825b9a7f8c2f043d0b970
-
memory/1736-0-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/1736-34-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/2692-23-0x00007FFFE3423000-0x00007FFFE3425000-memory.dmpFilesize
8KB
-
memory/2692-20-0x0000000000D60000-0x0000000000D6E000-memory.dmpFilesize
56KB
-
memory/2692-31-0x00007FFFE3420000-0x00007FFFE3EE1000-memory.dmpFilesize
10.8MB
-
memory/2692-1837-0x00007FFFE3420000-0x00007FFFE3EE1000-memory.dmpFilesize
10.8MB