Analysis
-
max time kernel
150s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 10:39
Behavioral task
behavioral1
Sample
a0681e79a7b3192f0e1095bd50230090_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a0681e79a7b3192f0e1095bd50230090_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
a0681e79a7b3192f0e1095bd50230090_NeikiAnalytics.exe
-
Size
206KB
-
MD5
a0681e79a7b3192f0e1095bd50230090
-
SHA1
ede4c71e7d34095115d8f146f4767be8f53105db
-
SHA256
7769de9fedf458d1d16fd04b5f5f74216a904fdb7b48fe032b34aa40b0bde2aa
-
SHA512
5711474900a0a7ca704cebb667c2f113b9622108e59f3f97740e218b26f9daf6c26749e1ff3aebb6ae0a8a2642ec9a32b1c932fd9a5676f77ce921c95c23ab23
-
SSDEEP
3072:fnyiQSowI9KHpKHDGCLOwstyhZFChcssc56FUrgxvbSD4UQrO2lxGN:KiQSo/9QpKjShcHUaC
Malware Config
Signatures
-
Renames multiple (5121) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 2 IoCs
pid Process 3148 _cpush.exe 2020 Zombie.exe -
resource yara_rule behavioral2/memory/2068-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/files/0x000700000002328e-8.dat upx behavioral2/files/0x00070000000233f4-12.dat upx behavioral2/memory/2068-25-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Zombie.exe a0681e79a7b3192f0e1095bd50230090_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\Zombie.exe a0681e79a7b3192f0e1095bd50230090_NeikiAnalytics.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Common Files\System\Ole DB\it-IT\oledb32r.dll.mui.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Reflection.dll.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\bin\fontmanager.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\OneNote\prnSendToOneNote_win7.cat.tmp Zombie.exe File created C:\Program Files\Common Files\System\Ole DB\en-US\sqloledb.rll.mui.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\lib\dt.jar.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\bin\api-ms-win-crt-conio-l1-1-0.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\rsod\proofing.msi.16.en-us.boot.tree.dat.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\BillingStatement.xltx.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Runtime.Loader.dll.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\legal\javafx\jpeg_fx.md.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogo.contrast-white_scale-80.png.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\OFFSYML.TTF.tmp Zombie.exe File created C:\Program Files\Common Files\System\Ole DB\msdaps.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\ext\nashorn.jar.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\fonts\LucidaSansDemiBold.ttf.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\WinWordLogoSmall.contrast-white_scale-180.png.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\MEDIA\HAMMER.WAV.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_Trial-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStdO365R_SubTest-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\NewCommentRTL.png.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\bin\api-ms-win-core-errorhandling-l1-1-0.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogo.contrast-black_scale-100.png.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\pt-BR\System.Windows.Forms.Design.resources.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_Grace-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStdCO365R_SubTrial-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\PROOF\msth8EN.DLL.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\chrmstp.exe.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\bin\servertool.exe.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Calibri.xml.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp5-ul-phn.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\mscss7cm_en.dub.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\clrgc.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.IO.Compression.FileSystem.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Effects\Subtle Solids.eftx.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeStudent2019R_Retail-ul-phn.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\pt\msipc.dll.mui.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\de-DE\tabskb.dll.mui.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\include\jawt.h.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019XC2RVL_MAKC2R-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Standard2019VL_KMS_Client_AE-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Common Files\System\ado\msader15.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Security.AccessControl.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\PresentationFramework.Luna.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\tr\UIAutomationProvider.resources.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019XC2RVL_MAKC2R-ul-phn.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019R_Trial-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\msoev.exe.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStdVL_KMS_Client-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\Microsoft.ReportingServices.ReportDesign.Forms.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusDemoR_BypassTrial365-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\BORDERS\MSART1.BDR.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000008\FA000000008.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\GKExcel.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\LogoImages\ExcelLogo.scale-140.png.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGMN105.XML.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.th-th.dll.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\th-TH\tipresx.dll.mui.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\Microsoft.WindowsDesktop.App.runtimeconfig.json.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Effects\Riblet.eftx.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Access2019R_Retail-ul-phn.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoR_Grace-ul-oob.xrm-ms.tmp Zombie.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2068 wrote to memory of 3148 2068 a0681e79a7b3192f0e1095bd50230090_NeikiAnalytics.exe 83 PID 2068 wrote to memory of 3148 2068 a0681e79a7b3192f0e1095bd50230090_NeikiAnalytics.exe 83 PID 2068 wrote to memory of 2020 2068 a0681e79a7b3192f0e1095bd50230090_NeikiAnalytics.exe 84 PID 2068 wrote to memory of 2020 2068 a0681e79a7b3192f0e1095bd50230090_NeikiAnalytics.exe 84 PID 2068 wrote to memory of 2020 2068 a0681e79a7b3192f0e1095bd50230090_NeikiAnalytics.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0681e79a7b3192f0e1095bd50230090_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\a0681e79a7b3192f0e1095bd50230090_NeikiAnalytics.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\_cpush.exe"_cpush.exe"2⤵
- Executes dropped EXE
PID:3148
-
-
C:\Windows\SysWOW64\Zombie.exe"C:\Windows\system32\Zombie.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2020
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD5f3c2f1e6ff360c1a7d64721c6e738925
SHA1647cd76aa523390f27dc2ea34d5a950e18fbf80f
SHA2568ffcead49985bcda57935824050f103bf525f1c00438517fccdb2a98b637d305
SHA512b2ac85cfd238e92f2262549dad760e93b3e06f4ebf58e85a008421a093c7fe947548dab20485d678a825b8c1befca24e9c6e4413e0dc74f7190e702228721e0a
-
Filesize
143KB
MD5c1d5e48111f4984433e6318466ee1bce
SHA1d3379a99f504b38794f491e4fff6c77cfab53eac
SHA256dfdf187874d7368a92bbebb68c8cdc5c183af47d954b5b27ddaeca6774ae4822
SHA512dfce97a9dc92521c2d576b3d21071cb04df4a6d927676a2b95abc0093b67a044aab8d3f8612a4a70f9128cf2555d3a554a1c3f941647a64d30298ab28bba7441
-
Filesize
62KB
MD5a5132d3a3f17bfd6fa64f5b30272e058
SHA14762186fe00e4e136f23cdbc9c8c855558a5084d
SHA256991038af0a4742dfd53a8f6649369598e4c966a10f0cb83baf3ef540b93d0bc9
SHA51247d47a8058eff2029ead977f48a928ad3a00d6959406e439ddedb04a800aa5af59fbc593f6b52992cf106cbf79030d616bbd4c79eafbb549f59c418048c68e08