Analysis

  • max time kernel
    150s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09/05/2024, 23:10

General

  • Target

    1aa10d772f770366cb15f7b84cc530c0_NeikiAnalytics.exe

  • Size

    204KB

  • MD5

    1aa10d772f770366cb15f7b84cc530c0

  • SHA1

    36576ebd935b103389b3173ce2b0634f393510dc

  • SHA256

    a6eba5b20035a3a86663ca1aa4293f721615bb3b9629070e224520301c48791e

  • SHA512

    90c362c6c7c7ceca6f013ebac2b9c91fceb41fdc6f6bd64967ea634107cd133d57c92867d95c421f5a712c953276f51c4252f49afd1cd2a9eea93e4a0e786e28

  • SSDEEP

    1536:BU9dFHQ4zxHwx8ZtuxNy3tQ9CW5EZWHakMwP9W6uXNi9f1AWa11GBPIdRONd+w6h:4XHQYte0tQ9nLHbB9W+k9ZJgImCtN1

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1aa10d772f770366cb15f7b84cc530c0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\1aa10d772f770366cb15f7b84cc530c0_NeikiAnalytics.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2300
    • C:\Users\Admin\xieiki.exe
      "C:\Users\Admin\xieiki.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2616

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\xieiki.exe

          Filesize

          204KB

          MD5

          96666b1af934693e1d31a9205730206f

          SHA1

          d0fa3975c94be88ae7d6e941a2fca7f8497b90ac

          SHA256

          c92e40bddc75462fc210a72f1a2542275a104dcffaa9d03d39e0f284375ff7b0

          SHA512

          c647dcf729f952eb2fc72b7355e08d1bd9a276642758d8adaab674be162aef768b5d60c637de57785c79c60dad3716dde55e6f970d80e4f88cc4abeffc254df1

        • memory/2300-0-0x0000000000400000-0x000000000043D000-memory.dmp

          Filesize

          244KB

        • memory/2300-14-0x0000000002D30000-0x0000000002D6D000-memory.dmp

          Filesize

          244KB

        • memory/2300-19-0x0000000000400000-0x000000000043D000-memory.dmp

          Filesize

          244KB

        • memory/2616-15-0x0000000000400000-0x000000000043D000-memory.dmp

          Filesize

          244KB

        • memory/2616-20-0x0000000000400000-0x000000000043D000-memory.dmp

          Filesize

          244KB