Analysis
-
max time kernel
150s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 18:21
Static task
static1
Behavioral task
behavioral1
Sample
5cdebc6c94f1f55a77d4e65683d9ee20_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5cdebc6c94f1f55a77d4e65683d9ee20_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
5cdebc6c94f1f55a77d4e65683d9ee20_NeikiAnalytics.exe
-
Size
393KB
-
MD5
5cdebc6c94f1f55a77d4e65683d9ee20
-
SHA1
695e8844a9eb471aae1a860eebfd54ca2da6b2ee
-
SHA256
9a99471f898c034091d309f00504bd5b2030a1503e31ec4978275f940d34b53e
-
SHA512
8a0ec16ca563e4b069f329db00b22f9440b760602b9d72cace6c65c3d40d498dc27f4820e021378336f9ce662a3d8622544e0aa5b149fabbb183cf7ee584b89c
-
SSDEEP
6144:RqKvb0CYJ973e+eKZ0VBFTlAOB6pcq+HpFeHPgsHsSYafq8g2Og:vvbxYX7Z0VdAzpcqapMvgzS/Jl
Malware Config
Signatures
-
Renames multiple (5112) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 2 IoCs
pid Process 2864 Zombie.exe 3972 _ConfigSecurityPolicy.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Zombie.exe 5cdebc6c94f1f55a77d4e65683d9ee20_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\Zombie.exe 5cdebc6c94f1f55a77d4e65683d9ee20_NeikiAnalytics.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGMN108.XML.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVFileSystemMetadata.dll.tmp Zombie.exe File created C:\Program Files\Common Files\System\ado\msado20.tlb.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\cs\WindowsBase.resources.dll.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\110.0.5481.104\Locales\kn.pak.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\bin\api-ms-win-core-memory-l1-1-0.dll.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\lib\jfr.jar.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\OFFSYMK.TTF.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\Microsoft.WindowsDesktop.App.runtimeconfig.json.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\rmiregistry.exe.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\legal\jdk\jpeg.md.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\lib\meta-index.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Red Violet.xml.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProR_Retail-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\es\PresentationFramework.resources.dll.tmp Zombie.exe File created C:\Program Files\7-Zip\Lang\tr.txt.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\security\cacerts.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\lib\images\cursors\win32_CopyNoDrop32x32.gif.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\OneNote\SendToOneNote-manifest.ini.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\vcruntime140.dll.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\110.0.5481.104\Locales\ko.pak.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\legal\jdk\unicode.md.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PersonalR_Trial-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\EXCEL.VisualElementsManifest.xml.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\zh-Hant\PresentationCore.resources.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000042\mecontrol.png.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVOrchestration.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\AccessVL_KMS_Client-ul.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_Subscription5-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.IO.Pipes.AccessControl.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\pt-BR\Microsoft.VisualBasic.Forms.resources.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_Subscription4-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_OEM_Perp4-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\Bibliography\Author2String.XSL.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.IO.Pipes.AccessControl.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Retrospect.thmx.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Consolas-Verdana.xml.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\WacLangPack2019Eula.txt.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\de\UIAutomationClientSideProviders.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\pl\PresentationFramework.resources.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Aspect.xml.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Security.Cryptography.OpenSsl.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\unpack200.exe.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\fre\StartMenu_Win10_RTL.mp4.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Professional2019R_Trial-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProCO365R_SubTest-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\PROTOCOLHANDLERINTL.DLL.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\da-DK\tipresx.dll.mui.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ja\System.Windows.Forms.Primitives.resources.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoVL_MAK-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019MSDNR_Retail-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000049\index.win32.bundle.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\AccessR_Retail-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\7-Zip\Lang\da.txt.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\lib\orb.idl.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\lib\ext\localedata.jar.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Access2019VL_KMS_Client_AE-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_Trial2-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdVL_MAK-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\Microsoft.Win32.Primitives.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Text.Encoding.CodePages.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\pl\PresentationCore.resources.dll.tmp Zombie.exe File created C:\Program Files\Internet Explorer\uk-UA\ieinstal.exe.mui.tmp Zombie.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3260 wrote to memory of 2864 3260 5cdebc6c94f1f55a77d4e65683d9ee20_NeikiAnalytics.exe 85 PID 3260 wrote to memory of 2864 3260 5cdebc6c94f1f55a77d4e65683d9ee20_NeikiAnalytics.exe 85 PID 3260 wrote to memory of 2864 3260 5cdebc6c94f1f55a77d4e65683d9ee20_NeikiAnalytics.exe 85 PID 3260 wrote to memory of 3972 3260 5cdebc6c94f1f55a77d4e65683d9ee20_NeikiAnalytics.exe 86 PID 3260 wrote to memory of 3972 3260 5cdebc6c94f1f55a77d4e65683d9ee20_NeikiAnalytics.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\5cdebc6c94f1f55a77d4e65683d9ee20_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\5cdebc6c94f1f55a77d4e65683d9ee20_NeikiAnalytics.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Windows\SysWOW64\Zombie.exe"C:\Windows\system32\Zombie.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2864
-
-
C:\Users\Admin\AppData\Local\Temp\_ConfigSecurityPolicy.exe"_ConfigSecurityPolicy.exe"2⤵
- Executes dropped EXE
PID:3972
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD5e399194ff2df5b2610518033b25756aa
SHA103e4855b25e3b7090308afd7b0419a014fc62ada
SHA2565e82edfc92e1d765102a3c921f6932eb9fdb56fc7bd1e17e9c2b0c9bf2da097b
SHA512fbd285165f27bbcf5e26c8c0ffc5695e2a78b0934f5986d06208e2cede2d5a9b396db15c6ec170301d515ea4bb87538eb3894ba6e09ddaa750ac48ad9acf1281
-
Filesize
304KB
MD5a2ff144973a98d241d129081fa9baa6b
SHA17db942775d84fe782e85390c0ddd1b1ef61617b1
SHA2561cc8e44c620067448bdd2fa88f9ff3a3c64b9a3f06b51c4116ab73376a48bc0a
SHA512c71abb7c0ad554d5f1a5e324163763c6ff5476d37145092c69f213973278c7899818a3809a80323184eaedcbd45f9f5a6acd73d776dc617d32ededc89f84a303
-
Filesize
89KB
MD5129e7af7c68270f60df6c9ea10f471e5
SHA12cd71268334051f0aeb7241d93a9e9cebb73245e
SHA25615ba76def92cfd7014fdd1163998bccfd03e96c7225c52cc05e01cc268c846eb
SHA512146d5f91b5fee3df881ad7c906684b2dbaf9e1ca11e8585fa06daad24856d022e2ece2ff6cb5509d409dc6ba726445310a600f0009cc6556cc656dc7a742e10d