Analysis

  • max time kernel
    122s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10-05-2024 22:53

General

  • Target

    21ee4b611cd6542d6367d51d53414350_NeikiAnalytics.exe

  • Size

    96KB

  • MD5

    21ee4b611cd6542d6367d51d53414350

  • SHA1

    c95aae804b2c3e0821d66364a26ee4bf7695c2b9

  • SHA256

    f7eafa4e04985cf483d490764d4ad448552e8f0ac4cc254057eefc4103ec6cce

  • SHA512

    13a505d98451f1adfb9a60449ec32cd57fa95b8db44dfde228d13e859b26564d3125165c883492dfc6148d473123d86529e59292c53ff3a29323e1bb3153ba1d

  • SSDEEP

    1536:mNRNuMfWgFDmSnQPiQVhhiOY8e+lAL1GOPETEhk7BLM2tM74S7V+5pUMv84WMRwd:mNR8MftnQvh9feto2Ick9LMic4Sp+7Ho

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 14 IoCs
  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 18 IoCs
  • Drops file in System32 directory 21 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 24 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\21ee4b611cd6542d6367d51d53414350_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\21ee4b611cd6542d6367d51d53414350_NeikiAnalytics.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1784
    • C:\Windows\SysWOW64\Biojif32.exe
      C:\Windows\system32\Biojif32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2312
      • C:\Windows\SysWOW64\Bbgnak32.exe
        C:\Windows\system32\Bbgnak32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2636
        • C:\Windows\SysWOW64\Bjbcfn32.exe
          C:\Windows\system32\Bjbcfn32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2504
          • C:\Windows\SysWOW64\Boplllob.exe
            C:\Windows\system32\Boplllob.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2576
            • C:\Windows\SysWOW64\Bhhpeafc.exe
              C:\Windows\system32\Bhhpeafc.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:1804
              • C:\Windows\SysWOW64\Bmeimhdj.exe
                C:\Windows\system32\Bmeimhdj.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in System32 directory
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:2476
                • C:\Windows\SysWOW64\Cacacg32.exe
                  C:\Windows\system32\Cacacg32.exe
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of WriteProcessMemory
                  PID:2016
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2016 -s 140
                    9⤵
                    • Loads dropped DLL
                    • Program crash
                    PID:1688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Bbgnak32.exe

    Filesize

    96KB

    MD5

    4aeda890347ca43743fc4a0df2acb1ec

    SHA1

    7d29f3cde197b51c1849d750c830c43ae0e1fe88

    SHA256

    71b0ae14c5ad77083da584a8d9dccba3efcca247ca903c84593d96de678a831f

    SHA512

    a4e55a6699c0edfae3fddadca93b8bb3050a64af4dbe6655ab8f557388a26edf1926b2f4d7e28d32f141f53ad0a133255e677ae8becb161fbd6d87794b96d3e4

  • C:\Windows\SysWOW64\Bhhpeafc.exe

    Filesize

    96KB

    MD5

    0cf54a9a5bb5b7c25e2bdfa69c878bc0

    SHA1

    fd2608c46ecfa62b07ae9f6e2092df29136aa878

    SHA256

    40ebaf77fc2cd9feccef65caa1a96c8c3b9299cfe02c1d3824ab8c4ef4aeef7f

    SHA512

    be90aed97d1e10ed32f723b7c3ab2b3e311258728e60cbda9aeecd20c397294a692dd8e050fcf1e3945bdeb07fb9145793badec2c6cca00fceec989a4fab22c5

  • C:\Windows\SysWOW64\Jodjlm32.dll

    Filesize

    7KB

    MD5

    eb45c275655c2c6365dd98230855fc20

    SHA1

    24fca233d1c44f48a646685266972e6ec94d3918

    SHA256

    9afe59853c3f2f538189fadd0af5620e1c181de2dbe38fbc9b3b615dfc166b46

    SHA512

    cef95884e0bef5007cd81508acb4755b80ed331760a06630bb6f3026d63c3845585095b28beecbea47082c70b6cc81ef1dff27d9cfadeede7f76d758d53b4307

  • \Windows\SysWOW64\Biojif32.exe

    Filesize

    96KB

    MD5

    39877013b8b177c82af2bb6ab7397c6f

    SHA1

    4a85d41f0658dffc3add8f951a0d6b556a295ebf

    SHA256

    3692d53634a2838a7db82eaddb9af0855410238686ca4f677142c71c3ac48ca2

    SHA512

    2a78886e67da9f91defe4baeefcd5da8cc94146d6737659d62d59053e1786ee963ac0ad0d28dfee4eef986962927346d4517f9ef5272fb46e0618d14d128320d

  • \Windows\SysWOW64\Bjbcfn32.exe

    Filesize

    96KB

    MD5

    c8adf8ed6d577304be82be2b85ae2ff4

    SHA1

    e0879ac3e466c2b55a9f828ddd6fa287cef05320

    SHA256

    8e72270ce5e997fd5035eabb3f66806a032b60d357788383ac2e15ee3033067b

    SHA512

    bc8bedc246d5bd587ff3bde3b997bd08df03623e0f9b977213529adbb6b50c7e78942c499f41836182f02ed8fbe17bfdbf09e595ffc29a4ba55330005d7a0bfd

  • \Windows\SysWOW64\Bmeimhdj.exe

    Filesize

    96KB

    MD5

    b67cdd21afe06957fe41521112727f3d

    SHA1

    5cd3ce723d3fc38b094598d8e4da0160e9f9c307

    SHA256

    b0617ebdbb3c9be6673fcd19641f6a71d8627cd82532c6be609f5b326b6d1fb8

    SHA512

    03bf4468ecbee5388607ad141d5bb02b238e78cdc8bba8879408d4dc594c7d74b1fc94245d11e34992a400150c87ae461421506816df18e4123a39c40b116e79

  • \Windows\SysWOW64\Boplllob.exe

    Filesize

    96KB

    MD5

    1b565b8ceb4d37c84cf296db90b67322

    SHA1

    403e2871b2c58961fad995994ca32342dcd9f12c

    SHA256

    e238063e4aa6cce9c7e69c4060f05e1c4a0ab43c3a4814741906d9985ea72019

    SHA512

    f6104e538a5ea7eba40f4a0b999a7f86f9e869efd8d15d636c9221bb3bdf9b7dac8ec69f806b31931172c4dd8cb53f59ca4cbd06eb097b88e21ad89f39439cf9

  • \Windows\SysWOW64\Cacacg32.exe

    Filesize

    96KB

    MD5

    5b43492f92799ef2517238225f46d5a9

    SHA1

    d14d8555c0ebde9a59a7d2b049076d79c7cd50ae

    SHA256

    edcf7e859cf3098ff9af4ccc201e1fb11bc8779800a4ada4bc455c65af8c602c

    SHA512

    fbe271bbbca2b290c0ce59caa81a9834c9c9ceb3c5249b26df063aeb3816b812b05955624146b4db4d69e4bc513c48e11cf87a9f8cf09aa0e2b11c09e5577cf0

  • memory/1784-102-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/1784-0-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/1784-12-0x00000000002B0000-0x00000000002EF000-memory.dmp

    Filesize

    252KB

  • memory/1784-6-0x00000000002B0000-0x00000000002EF000-memory.dmp

    Filesize

    252KB

  • memory/1804-82-0x0000000001BE0000-0x0000000001C1F000-memory.dmp

    Filesize

    252KB

  • memory/1804-69-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/1804-106-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2016-97-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2312-19-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2476-91-0x0000000000300000-0x000000000033F000-memory.dmp

    Filesize

    252KB

  • memory/2476-107-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2476-83-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2504-104-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2504-49-0x0000000000220000-0x000000000025F000-memory.dmp

    Filesize

    252KB

  • memory/2576-55-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2576-105-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2576-67-0x0000000000470000-0x00000000004AF000-memory.dmp

    Filesize

    252KB

  • memory/2636-27-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2636-35-0x0000000000230000-0x000000000026F000-memory.dmp

    Filesize

    252KB

  • memory/2636-103-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/2636-41-0x0000000000230000-0x000000000026F000-memory.dmp

    Filesize

    252KB