Analysis
-
max time kernel
150s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 23:59
Behavioral task
behavioral1
Sample
281fd1de65e5e1519b9c2285912fa8b0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
281fd1de65e5e1519b9c2285912fa8b0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
281fd1de65e5e1519b9c2285912fa8b0_NeikiAnalytics.exe
-
Size
659KB
-
MD5
281fd1de65e5e1519b9c2285912fa8b0
-
SHA1
fe6375f8331180009735f2036c36af636a72643d
-
SHA256
b3f70c4465ceef59c8047f505546bfbd52e72378ccccd2b40aa808d31f5aacc7
-
SHA512
7fd0068d80ef0294c19f30e64ccfdc77dcc06cd635c937c90c1a8a12c1fd758155fcbf8569c86e79365d768a1d7908a89201c060537669f2ab4de8a988859e24
-
SSDEEP
6144:wHm3AIuZAIuDMVtM/L2ZKS7bYrIOXsqmWzJrdc6GJRQUWGUA9PRWLiFSbE56FORu:XAIuZAIuOEQ7J2lWRPWhA9PRWg9E
Malware Config
Signatures
-
Renames multiple (4646) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 2 IoCs
pid Process 1968 Zombie.exe 3520 _setup.exe -
resource yara_rule behavioral2/memory/1664-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/files/0x000600000002327c-6.dat upx behavioral2/files/0x0007000000023416-12.dat upx behavioral2/memory/1664-20-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Zombie.exe 281fd1de65e5e1519b9c2285912fa8b0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\Zombie.exe 281fd1de65e5e1519b9c2285912fa8b0_NeikiAnalytics.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\Microsoft.NETCore.App.deps.json.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\cs\System.Xaml.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\de\UIAutomationClientSideProviders.resources.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\OutlookVL_KMS_Client-ul.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PowerPoint2019VL_KMS_Client_AE-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\7-Zip\Lang\bn.txt.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\AppvIsvSubsystems32.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\Microsoft.CSharp.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProXC2RVL_MAKC2R-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogoSmall.scale-80.png.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\eu\msipc.dll.mui.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Access2019VL_MAK_AE-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_Subscription4-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp3-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\WordVL_MAK-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipscht.xml.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\pl\UIAutomationClient.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\System.Windows.Forms.Primitives.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\AccessVL_MAK-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_OEM_Perp4-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStdO365R_SubTest-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\ClientVolumeLicense_eula.txt.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Spatial.NetFX35.V7.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\es\Microsoft.VisualBasic.Forms.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\es\PresentationUI.resources.dll.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\110.0.5481.104\Locales\et.pak.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Xml.Linq.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ja\WindowsFormsIntegration.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\zh-Hans\UIAutomationClient.resources.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusEDUR_Subscription-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\PowerPntLogoSmall.contrast-black_scale-180.png.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-core-synch-l1-2-0.dll.tmp Zombie.exe File created C:\Program Files\dotnet\host\fxr\6.0.27\hostfxr.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Linq.Expressions.dll.tmp Zombie.exe File created C:\Program Files\7-Zip\Lang\ca.txt.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Collections.Concurrent.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\fr\UIAutomationClientSideProviders.resources.dll.tmp Zombie.exe File created C:\Program Files\7-Zip\Lang\co.txt.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\Microsoft.NETCore.App.deps.json.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\it\UIAutomationClientSideProviders.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\it\Microsoft.VisualBasic.Forms.resources.dll.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\110.0.5481.104\Locales\pt-BR.pak.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\msvcp140_1.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.AppContext.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Windows.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\tr\PresentationFramework.resources.dll.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2R32.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoR_SubTest-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\OneNoteLogoSmall.contrast-black_scale-100.png.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\zh-Hant\UIAutomationClientSideProviders.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ru\UIAutomationClientSideProviders.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\lib\security\trusted.libraries.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Resources.Reader.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessPipcDemoR_BypassTrial365-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Word2019VL_MAK_AE-ul-phn.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Client\api-ms-win-crt-filesystem-l1-1-0.dll.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\TabIpsps.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\pt-BR\PresentationUI.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\npt.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019XC2RVL_MAKC2R-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\offsymsl.ttf.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Cartridges\Sybase.xsl.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Globalization.Calendars.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Reflection.Emit.dll.tmp Zombie.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3520 _setup.exe 3520 _setup.exe 3520 _setup.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1664 wrote to memory of 1968 1664 281fd1de65e5e1519b9c2285912fa8b0_NeikiAnalytics.exe 83 PID 1664 wrote to memory of 1968 1664 281fd1de65e5e1519b9c2285912fa8b0_NeikiAnalytics.exe 83 PID 1664 wrote to memory of 1968 1664 281fd1de65e5e1519b9c2285912fa8b0_NeikiAnalytics.exe 83 PID 1664 wrote to memory of 3520 1664 281fd1de65e5e1519b9c2285912fa8b0_NeikiAnalytics.exe 84 PID 1664 wrote to memory of 3520 1664 281fd1de65e5e1519b9c2285912fa8b0_NeikiAnalytics.exe 84 PID 1664 wrote to memory of 3520 1664 281fd1de65e5e1519b9c2285912fa8b0_NeikiAnalytics.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\281fd1de65e5e1519b9c2285912fa8b0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\281fd1de65e5e1519b9c2285912fa8b0_NeikiAnalytics.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\Zombie.exe"C:\Windows\system32\Zombie.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1968
-
-
C:\Users\Admin\AppData\Local\Temp\_setup.exe"_setup.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3520
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
202KB
MD55025cfaaae268d74eb3d45a3ec629bee
SHA1346b36d6db9a387ed6c5e63dc531fd00b51cf237
SHA256e1ffe1408123999f1f5bda5047fda89ae16ed2319d80e6e92d92014bf0e5eafe
SHA51233d5afddb2848640717759b93b90b20c8354fdabffdca9ebc000703f980731a5035795252750cf80b82076f0f02fab2aa12ea00c11d468e8e15ee21686f1f84a
-
Filesize
457KB
MD5446366ca32877e2290d0bd8f22e11809
SHA1b620d296d53566d9a07c1cabc92c50d0f5c4f34a
SHA2564b76c0ea832d58966f824cfedb9a3831b1c286b13cc22d56e29dad7966847184
SHA512edbb4cd70b9c372f827136db217087451732f83a34af854ff031a659e9aee0fe849c0005a38d2bd19f438f8277147101a577fa900b89e2e1f804b369134255cf
-
Filesize
202KB
MD56a3afa0b51bd0c58471259129916e6c8
SHA1c81ede222810058f922a4982fc90187c08d9f2d9
SHA256e39d1245b64e6bb6078306976e3e1cb38df291b9a7d7b34527e009d2f9dd9a09
SHA5125abf5a297148f94747ffd142bbf202ceb29bf44709870eafc0f2398c45776c2e8f9fb96d05b8979b83f00bb60cc13639bb3b216a717dfc6c796c37b2d0f2d7ae