Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10-06-2024 23:22
Static task
static1
Behavioral task
behavioral1
Sample
1efe27e85891a46a1e7959c12fd137b0_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
1efe27e85891a46a1e7959c12fd137b0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
1efe27e85891a46a1e7959c12fd137b0_NeikiAnalytics.exe
-
Size
396KB
-
MD5
1efe27e85891a46a1e7959c12fd137b0
-
SHA1
cb2a2fe051231b335393982e85ebed4e37f27a3b
-
SHA256
19c7b6bbf6dca55efbe542bd69260269a5c1afbb4b93b70dface6145c485fb19
-
SHA512
6be1392d7126a6997314db44d7d1df60a2a0aa7a50140ae7c4363feff8c9fca1fa6bc8057f3d9e1fcba5b83504eb79dc55aa912b6db946bd44b6da5a585f8d1f
-
SSDEEP
6144:RqAtkemFTlAOB6pcq+HpFeHPgsHsSYafq8g2Oo:dkhAzpcqapMvgzS/Jl
Malware Config
Signatures
-
Renames multiple (5027) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 2 IoCs
pid Process 4284 Zombie.exe 1496 _ConfigSecurityPolicy.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Zombie.exe 1efe27e85891a46a1e7959c12fd137b0_NeikiAnalytics.exe File opened for modification C:\Windows\SysWOW64\Zombie.exe 1efe27e85891a46a1e7959c12fd137b0_NeikiAnalytics.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\root\Office16\osfFPA\addins.xml.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\zh-Hans\WindowsBase.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\bin\prism_d3d.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PublisherVL_MAK-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ru\PresentationCore.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\api-ms-win-crt-time-l1-1-0.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\AccessR_Retail-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Private.Xml.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\CancelGlyph.16.GrayF.png.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\STSLIST.DLL.tmp Zombie.exe File created C:\Program Files\ConvertSwitch.mov.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\Microsoft.CSharp.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\System.Net.Requests.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Xml.XPath.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\fr\PresentationUI.resources.dll.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\tpcps.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\System.Windows.Forms.Primitives.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\OneNote\SendToOneNoteNames.gpd.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\lib\security\public_suffix_list.dat.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\LivePersonaCard\lpc.win32.bundle.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\MSOARIA.DLL.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\Microsoft.NETCore.App.runtimeconfig.json.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessPipcR_Grace-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\EXCEL.VisualElementsManifest.xml.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Personal2019DemoR_BypassTrial180-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioStdO365R_SubTest-pl.xrm-ms.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Private.DataContractSerialization.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Private.Xml.Linq.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\legal\jdk\relaxngcc.md.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\bin\ucrtbase.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Client\api-ms-win-crt-conio-l1-1-0.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_OEM_Perp4-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PowerPointVL_MAK-ul-oob.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlusDemoR_BypassTrial180-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\it\UIAutomationProvider.resources.dll.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\zh-Hant\System.Windows.Forms.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\orbd.exe.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\WordNaiveBayesCommandRanker.txt.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\fi\msipc.dll.mui.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\PROOF\MSHY7FR.DLL.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\cs\WindowsFormsIntegration.resources.dll.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jmc.txt.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\pkeyconfig-office.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\offsym.ttf.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\ONENOTE_COL.HXT.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\pl\WindowsBase.resources.dll.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\110.0.5481.104\Locales\ms.pak.tmp Zombie.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\images\cursors\win32_CopyDrop32x32.gif.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\bin\hprof.dll.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-environment-l1-1-0.dll.tmp Zombie.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipsita.xml.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Net.Requests.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000008\FA000000008.tmp Zombie.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Net.Security.dll.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\MondoR_BypassTrial180-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectPro2019R_Retail-ul-phn.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectProCO365R_SubTrial-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Google\Chrome\Application\110.0.5481.104\nacl_irt_x86_64.nexe.tmp Zombie.exe File created C:\Program Files\Java\jre-1.8\legal\javafx\mesa3d.md.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Licenses16\OutlookVL_MAK-ppd.xrm-ms.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\Bibliography\Style\MLASeventhEditionOfficeOnline.xsl.tmp Zombie.exe File created C:\Program Files\Microsoft Office\root\Office16\MSO.FRAMEPROTOCOLWIN32.DLL.tmp Zombie.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1584 wrote to memory of 4284 1584 1efe27e85891a46a1e7959c12fd137b0_NeikiAnalytics.exe 80 PID 1584 wrote to memory of 4284 1584 1efe27e85891a46a1e7959c12fd137b0_NeikiAnalytics.exe 80 PID 1584 wrote to memory of 4284 1584 1efe27e85891a46a1e7959c12fd137b0_NeikiAnalytics.exe 80 PID 1584 wrote to memory of 1496 1584 1efe27e85891a46a1e7959c12fd137b0_NeikiAnalytics.exe 81 PID 1584 wrote to memory of 1496 1584 1efe27e85891a46a1e7959c12fd137b0_NeikiAnalytics.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\1efe27e85891a46a1e7959c12fd137b0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1efe27e85891a46a1e7959c12fd137b0_NeikiAnalytics.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\SysWOW64\Zombie.exe"C:\Windows\system32\Zombie.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4284
-
-
C:\Users\Admin\AppData\Local\Temp\_ConfigSecurityPolicy.exe"_ConfigSecurityPolicy.exe"2⤵
- Executes dropped EXE
PID:1496
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD54a1e106d7e6b6740b666fb433a2c06d4
SHA1d58c7193d9905d4ddf53fa69b0b11465e0eacf13
SHA256d8241389df064a23b993c08acbe8833a7460570ae3a61b0d67ed0a06eacf1a03
SHA5125d613362346ee9f4d5db2b75a66ed571e54cf0380591133bfed2ca11b89fefe2b23f749ad183245f0c3d63240b13ed05629f5d43df7d926bae02bf2539e497cd
-
Filesize
304KB
MD5a2ff144973a98d241d129081fa9baa6b
SHA17db942775d84fe782e85390c0ddd1b1ef61617b1
SHA2561cc8e44c620067448bdd2fa88f9ff3a3c64b9a3f06b51c4116ab73376a48bc0a
SHA512c71abb7c0ad554d5f1a5e324163763c6ff5476d37145092c69f213973278c7899818a3809a80323184eaedcbd45f9f5a6acd73d776dc617d32ededc89f84a303
-
Filesize
92KB
MD50ee6b6de6a5dfda15635bf72507964e9
SHA15c2266fe332d7fee86d02041482310adee86fb9c
SHA2565a2dc4a2e4bddde80baf9143b58a06779134bb03a693449523f92e3867766e0a
SHA512c60b923b00a3f843ee4a514d0ff0549a68bdd14d71e3d214b923a15a13b6f945024368a29cf14ac2368189548325ae6f10ab8f7bb870cb00065ee91e524d0411