Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 19:23
Static task
static1
Behavioral task
behavioral1
Sample
8a3b2d43fd63447cfd523ed1a06d70e0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8a3b2d43fd63447cfd523ed1a06d70e0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
8a3b2d43fd63447cfd523ed1a06d70e0_NeikiAnalytics.exe
-
Size
215KB
-
MD5
8a3b2d43fd63447cfd523ed1a06d70e0
-
SHA1
8adb76bebaafa632b260f3d7f344ca2056ef5783
-
SHA256
00091f6a6937faf51b5b1840daa04058087e4eede8879b477e624e5641cfaab7
-
SHA512
0d5b14a33a84e3c521f6a7ef3625a756a74654043ea568800707cea8e974dbb8b2312c75a044eee2ce17c49aebc2cd868e5e1b3fd4bc9737d0d1db433513981f
-
SSDEEP
3072:69WpQEJAOE9tHpKrvGCLOwstyhZFChcssc56FUrgxvbSD4UQrO2ExI:nfAB95pK7ShcHUan
Malware Config
Signatures
-
Renames multiple (5195) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 2 IoCs
Processes:
Zombie.exe_clist.exepid process 1088 Zombie.exe 1080 _clist.exe -
Drops file in System32 directory 2 IoCs
Processes:
8a3b2d43fd63447cfd523ed1a06d70e0_NeikiAnalytics.exedescription ioc process File created C:\Windows\SysWOW64\Zombie.exe 8a3b2d43fd63447cfd523ed1a06d70e0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\Zombie.exe 8a3b2d43fd63447cfd523ed1a06d70e0_NeikiAnalytics.exe -
Drops file in Program Files directory 64 IoCs
Processes:
Zombie.exedescription ioc process File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\ko\PresentationCore.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\ru\System.Windows.Forms.Primitives.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\deploy\messages_zh_CN.properties.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\MINSBROAMINGPROXY.DLL.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\PROOF\msth8EN.LEX.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\StudentReport.dotx.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\cs\UIAutomationTypes.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\cs\PresentationFramework.resources.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp2-ul-phn.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\StandardR_Retail-ul-phn.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\vfs\Fonts\private\MSJH.TTC.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Reflection.Primitives.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogoSmall.scale-80.png.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\BillingStatement.xltx.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_OEM_Perp2-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\System.Security.Cryptography.Pkcs.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\it\System.Windows.Input.Manipulations.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\legal\jdk\cryptix.md.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\AccessR_Grace-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.IO.UnmanagedMemoryStream.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoR_Subscription2-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\OFFICE.DLL.tmp Zombie.exe File created C:\Program Files\Common Files\System\Ole DB\msdatl3.dll.tmp Zombie.exe File created C:\Program Files\Common Files\System\Ole DB\de-DE\sqlxmlx.rll.mui.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Security.Cryptography.Encoding.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Net.NetworkInformation.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ko\System.Windows.Forms.Primitives.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\lcms.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlusMSDNR_Retail-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\MSIPCEvents.man.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\ODBC Drivers\Redshift\lib\sbicuuc53_64.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Resources.ResourceManager.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ja\UIAutomationClientSideProviders.resources.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoR_O16EnterpriseVL_Bypass30-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogoSmall.scale-100.png.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\mip_telemetry.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL086.XML.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] Zombie.exe File created C:\Program Files\7-Zip\Lang\fur.txt.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\security\cacerts.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Client\mfc140u.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProfessionalPipcR_OEM_Perp-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusiness2019R_Retail-ul-phn.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusiness2019VL_MAK_AE-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\OneNote\prnSendToOneNote.cat.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\rsod\dcf.x-none.msi.16.x-none.tree.dat.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Text.Encodings.Web.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\ko\PresentationUI.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\pt-BR\UIAutomationClientSideProviders.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\System.Drawing.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\bin\rmid.exe.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessPipcR_Grace-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogoSmall.scale-140.png.tmp Zombie.exe File created C:\Program Files\Common Files\System\ado\msador15.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ja\WindowsBase.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\System.Design.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\bin\rmic.exe.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ExcelR_Retail-ul-phn.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_SubTrial3-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp6-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_f2\FA000000002.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\it\System.Windows.Forms.Design.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Security.Cryptography.Algorithms.dll.tmp Zombie.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
8a3b2d43fd63447cfd523ed1a06d70e0_NeikiAnalytics.exedescription pid process target process PID 2028 wrote to memory of 1088 2028 8a3b2d43fd63447cfd523ed1a06d70e0_NeikiAnalytics.exe Zombie.exe PID 2028 wrote to memory of 1088 2028 8a3b2d43fd63447cfd523ed1a06d70e0_NeikiAnalytics.exe Zombie.exe PID 2028 wrote to memory of 1088 2028 8a3b2d43fd63447cfd523ed1a06d70e0_NeikiAnalytics.exe Zombie.exe PID 2028 wrote to memory of 1080 2028 8a3b2d43fd63447cfd523ed1a06d70e0_NeikiAnalytics.exe _clist.exe PID 2028 wrote to memory of 1080 2028 8a3b2d43fd63447cfd523ed1a06d70e0_NeikiAnalytics.exe _clist.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a3b2d43fd63447cfd523ed1a06d70e0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\8a3b2d43fd63447cfd523ed1a06d70e0_NeikiAnalytics.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Zombie.exe"C:\Windows\system32\Zombie.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Users\Admin\AppData\Local\Temp\_clist.exe"_clist.exe"2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\$Recycle.Bin\S-1-5-21-3558294865-3673844354-2255444939-1000\desktop.ini.exeFilesize
72KB
MD517b922237c047fbff08d16c991b79870
SHA104e97eef5d0184ae10896a7e20df34e8b5eae91c
SHA2562dd1c179f71db3574931a886de3eec9af2d2444eed01be0b05fc1d498ef64fe7
SHA512d801c9ebfab5ee7122152cd376befb142a1bafcf4fe6e09db22b3f878d759bc204e3795704fd63345b8bf910a998dd89b77dae14123696130839fe8d4f93956a
-
C:\Users\Admin\AppData\Local\Temp\_clist.exeFilesize
143KB
MD5b27ea830fb39bc056e65f9a2260ae216
SHA1b69e40ee5cabe0721d2d1e9fbdd4088fd87592d6
SHA256fb7fab836f744d669451dcd38aa7d2a9c74c6af893c258d079439b58abce70d8
SHA51222cad79d90a949174828ee5e3ce621113591c7c991c55c1a6a44a4555002adeb3bcbd9bab6cfbbfdefd663b76ac2dae96d70a01c527b312c7e8d223334a30219
-
C:\Windows\SysWOW64\Zombie.exeFilesize
72KB
MD50cbbb285bb28920f582a8533553b3c97
SHA1a77e6ada28051f987d0b6a7724cc5bd4f92e8ea3
SHA256445f3742790fba302fded9b79c480e98adb0de2dd9276d28966fb522665f6131
SHA512b15566e8954a2436a2c487fdc20078f273fe219392572ec8fcac23013f3dd00916541ab8e8ea2c960951aba5258a81df8522eaee2ee391f8540fdd7a9d9287ff
-
memory/1080-22-0x00007FFB43783000-0x00007FFB43785000-memory.dmpFilesize
8KB
-
memory/1080-19-0x00000000003E0000-0x0000000000408000-memory.dmpFilesize
160KB