Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    10-05-2024 23:41

General

  • Target

    2f5a6460066ce6bb64226a240187edc0_NeikiAnalytics.exe

  • Size

    320KB

  • MD5

    2f5a6460066ce6bb64226a240187edc0

  • SHA1

    27133a0ce47e8f79d63f90b6b92eb6f3e79904bc

  • SHA256

    6b72d50525905a298cc6e4173f144b31f2dbaca23b5fe1ed84805bf47f2b8bc8

  • SHA512

    8394d0b0f4b7a816456a6e9cdf2b3a549a18dd35c443cf2836d97c371c663c4741bf339f3d3a09c6e1d4321abac0715c66834f4b94954ed6bb8ca721bcc7617c

  • SSDEEP

    6144:yHV58OEnoZvlmY/m05XUEtMEX6vluZV4U/vlf0DrBqvl8ZV4U/vlfl+9Q:y158ToZvHm05XEvG6IveDVqvQ6IvP

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 30 IoCs
  • Executes dropped EXE 15 IoCs
  • Loads dropped DLL 34 IoCs
  • Drops file in System32 directory 45 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 48 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2f5a6460066ce6bb64226a240187edc0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\2f5a6460066ce6bb64226a240187edc0_NeikiAnalytics.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1684
    • C:\Windows\SysWOW64\Gpknlk32.exe
      C:\Windows\system32\Gpknlk32.exe
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2096
      • C:\Windows\SysWOW64\Gpmjak32.exe
        C:\Windows\system32\Gpmjak32.exe
        3⤵
        • Adds autorun key to be loaded by Explorer.exe on startup
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2656
        • C:\Windows\SysWOW64\Gldkfl32.exe
          C:\Windows\system32\Gldkfl32.exe
          4⤵
          • Adds autorun key to be loaded by Explorer.exe on startup
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in System32 directory
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2908
          • C:\Windows\SysWOW64\Gelppaof.exe
            C:\Windows\system32\Gelppaof.exe
            5⤵
            • Adds autorun key to be loaded by Explorer.exe on startup
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:2856
            • C:\Windows\SysWOW64\Gkihhhnm.exe
              C:\Windows\system32\Gkihhhnm.exe
              6⤵
              • Adds autorun key to be loaded by Explorer.exe on startup
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of WriteProcessMemory
              PID:2104
              • C:\Windows\SysWOW64\Gogangdc.exe
                C:\Windows\system32\Gogangdc.exe
                7⤵
                • Adds autorun key to be loaded by Explorer.exe on startup
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in System32 directory
                • Modifies registry class
                • Suspicious use of WriteProcessMemory
                PID:2628
                • C:\Windows\SysWOW64\Hiqbndpb.exe
                  C:\Windows\system32\Hiqbndpb.exe
                  8⤵
                  • Adds autorun key to be loaded by Explorer.exe on startup
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Drops file in System32 directory
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:2024
                  • C:\Windows\SysWOW64\Hkpnhgge.exe
                    C:\Windows\system32\Hkpnhgge.exe
                    9⤵
                    • Adds autorun key to be loaded by Explorer.exe on startup
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Drops file in System32 directory
                    • Modifies registry class
                    • Suspicious use of WriteProcessMemory
                    PID:2780
                    • C:\Windows\SysWOW64\Hggomh32.exe
                      C:\Windows\system32\Hggomh32.exe
                      10⤵
                      • Adds autorun key to be loaded by Explorer.exe on startup
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Drops file in System32 directory
                      • Modifies registry class
                      • Suspicious use of WriteProcessMemory
                      PID:1072
                      • C:\Windows\SysWOW64\Hgilchkf.exe
                        C:\Windows\system32\Hgilchkf.exe
                        11⤵
                        • Adds autorun key to be loaded by Explorer.exe on startup
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Drops file in System32 directory
                        • Modifies registry class
                        • Suspicious use of WriteProcessMemory
                        PID:2428
                        • C:\Windows\SysWOW64\Hodpgjha.exe
                          C:\Windows\system32\Hodpgjha.exe
                          12⤵
                          • Adds autorun key to be loaded by Explorer.exe on startup
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Drops file in System32 directory
                          • Modifies registry class
                          • Suspicious use of WriteProcessMemory
                          PID:1832
                          • C:\Windows\SysWOW64\Icbimi32.exe
                            C:\Windows\system32\Icbimi32.exe
                            13⤵
                            • Adds autorun key to be loaded by Explorer.exe on startup
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Drops file in System32 directory
                            • Modifies registry class
                            • Suspicious use of WriteProcessMemory
                            PID:1032
                            • C:\Windows\SysWOW64\Ieqeidnl.exe
                              C:\Windows\system32\Ieqeidnl.exe
                              14⤵
                              • Adds autorun key to be loaded by Explorer.exe on startup
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Drops file in System32 directory
                              • Modifies registry class
                              • Suspicious use of WriteProcessMemory
                              PID:316
                              • C:\Windows\SysWOW64\Ilknfn32.exe
                                C:\Windows\system32\Ilknfn32.exe
                                15⤵
                                • Adds autorun key to be loaded by Explorer.exe on startup
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • Drops file in System32 directory
                                • Modifies registry class
                                • Suspicious use of WriteProcessMemory
                                PID:2340
                                • C:\Windows\SysWOW64\Iagfoe32.exe
                                  C:\Windows\system32\Iagfoe32.exe
                                  16⤵
                                  • Executes dropped EXE
                                  • Suspicious use of WriteProcessMemory
                                  PID:1456
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 1456 -s 140
                                    17⤵
                                    • Loads dropped DLL
                                    • Program crash
                                    PID:1624

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Gkihhhnm.exe

    Filesize

    320KB

    MD5

    7a08defabd64a7d7cd6afd6c32f11238

    SHA1

    ee91e60b9356a260b03cc3ed322d6ea28fa2eead

    SHA256

    82d9d775d1a731b84a62247e93b16b3d0a9a37247e640753b92aa38cadd1d099

    SHA512

    18c42fe1177598ef80ea898978177a9cfa010c4c849f8ca99ebfd843c279b03bcf3fa55c752f587859b326b12eb2c17b6fa00332a1be6f01a92ca73e944ee47d

  • C:\Windows\SysWOW64\Gpmjak32.exe

    Filesize

    320KB

    MD5

    36b9ed0cbae3b7e440c93de878ac9bee

    SHA1

    0b1d44c31a9377499644ee3993c41a778bc3c33f

    SHA256

    b9b74e56285ed883fafd7eb6edc1ca9258b0cf4da9ca0fe17e9fadbbd8e5a786

    SHA512

    6b3d9c312e58bf740708b1f60cfd024895a73deb6ff72a02d0a44c27d9d128e240dc08a49ac4e08210e6b6f37ecb08da60952d4bb7a01ee4eff57df6c8803a3c

  • C:\Windows\SysWOW64\Hggomh32.exe

    Filesize

    320KB

    MD5

    425e3027040a62d7e484df3ab8a17bdb

    SHA1

    d7797dd7c49830a27b7b9b44ec48573699ed69b6

    SHA256

    eadb5aea6fa3b3d993c5a000bf9b6b78a6d55954855a8027269eb6df2e07655c

    SHA512

    6890ce5181799b154452242192e205ad3d361ae6efc2592ab70c2323a2bae7e2c88c7814b6c49fcb7d5e4bfdbdcb19515a8217a96a4e13ba141d6f246dd4d48f

  • C:\Windows\SysWOW64\Ieqeidnl.exe

    Filesize

    320KB

    MD5

    417f4f92a2a32eae0ba610305aa66a95

    SHA1

    4552dbadbecc67540b6e7d7e0ff450659e31e405

    SHA256

    e667d57808083f3d101966b785ce7025a2796ec090da054eb274c60056f627cc

    SHA512

    09c93bea9bdff769b042e76669c126758076b29febb0dfad7d354949ea7208e66cabfcd04ad045924f7cc03301695b5386dae54d7131553bef80ad5baf9037ac

  • C:\Windows\SysWOW64\Ilknfn32.exe

    Filesize

    320KB

    MD5

    100ad487b587506ddacb3daab2d781f7

    SHA1

    c7fc725996f852c38137d668387ed1674cebac38

    SHA256

    ee3cd8e639174da4a102258fdea77157d09605ff0d7e9b9970e61baa15057f78

    SHA512

    abac7eda10ce6fbe9515b012e8246651d84228abc7294da5b00a3ea1d5325f5eb1306b74ee6bbbe3598ba27bd853fbd6c97f7424566f982e2dd9db9d1ddb5262

  • \Windows\SysWOW64\Gelppaof.exe

    Filesize

    320KB

    MD5

    a42c265212245cfa8b68af14cefa66c9

    SHA1

    19749de5dd461ceb8734f22275a3dd414b817409

    SHA256

    f49f8d109ee71e1d009be4c92943cee2942661df92622f1e2c0b1580cb57528d

    SHA512

    1d74264ef56859413c752f49cb4d8a1b874d12a76374bd98ff124ceedfee481286ed04aefa34cd213e295e5b0f03641543ed952ba19a3f0026cf9d52654e3c46

  • \Windows\SysWOW64\Gldkfl32.exe

    Filesize

    320KB

    MD5

    69da312516f5bbf98e5629701441b9c5

    SHA1

    cb0ce88ef8827759f378b6abc648054e65087c39

    SHA256

    aeccddb424384137f113f66c8a365e5307621aba3ffc761e99c8ecd0230e8dd4

    SHA512

    3ec0f45058d12cfa26d3fe6e8af25f4dbc729f26b83b31000f91ea4c30c62cfbd9602cb9e834cf6cba0010d5c43008f542da4b4aa2f5085db9839e05b2188342

  • \Windows\SysWOW64\Gogangdc.exe

    Filesize

    320KB

    MD5

    e23f71ce97b3cc74d3e681e383176a7d

    SHA1

    9cdf3ee0bf6ea7bef1b5e4ca6cd3559bde3bcff9

    SHA256

    7a403e74645aefd133abafbd73a5d0231fa68db0a07adfcf249792f2ad08453f

    SHA512

    2fc506335c75656bdf06b0441b9e4d547adf5eed548b557c6769d412eb89019f782aacec942fb38b0499a171ae724ade68eee5d5104ed6c484e6a924da1c3f81

  • \Windows\SysWOW64\Gpknlk32.exe

    Filesize

    320KB

    MD5

    23cce5a6020d975a1a60c6b4af6e2571

    SHA1

    ce1a95fc0e6a7a9de21f0a719610101f172ddc9f

    SHA256

    e8abd0f8fa5b267623eccce5cb56052d371d10164ffe0dbfb618aa56457b0ed2

    SHA512

    03a7d1d217ea203fc11850e449ac84b7c4e203de26ab2fccd4ef0adef2cda530d00711b720bbb8e8b32b1a2de3e8aa7269695e681a8785c2978fc1d5e4ca16e6

  • \Windows\SysWOW64\Hgilchkf.exe

    Filesize

    320KB

    MD5

    c2b29ebd92a4bc272eb147203809f42c

    SHA1

    b6fedda076b2ba599c546f41de6555324c62b249

    SHA256

    590a95d383d19c4d9525743f490e5032552e08543195af32875896aad38b09cb

    SHA512

    26a321bbf6abe6cd67a05e18b4d2d0b8b37e82df155d471480329f17250532cc90203cdd64fa69b6f9080620cbf502c0402554790df13bbed2906a5140f8c327

  • \Windows\SysWOW64\Hiqbndpb.exe

    Filesize

    320KB

    MD5

    7bb6100ce256ddb4c1b1c075ef31fd62

    SHA1

    4863d820ee6c2c59666d6b8026eac702ee12e61e

    SHA256

    0f5da445392ba42d4a129a774efe0769df15113c557b659966d12b86975fc980

    SHA512

    fa22169992fb2074c5cff9781c15b7533b1b9b53e87aa074101edf911ba679f11412b7fb8fb91909719e31c9048f47b6ceafada0c8d94de879f3780547721a3a

  • \Windows\SysWOW64\Hkpnhgge.exe

    Filesize

    320KB

    MD5

    77dfdaec41448781be4ca242684b7328

    SHA1

    19743134eb1111dae49201a8c805312a46342dba

    SHA256

    cf4cb1e446e706bb4aca148ec74b68c2d0fa0158749aa89c3cbb87e9b4df61e8

    SHA512

    870dac8f5aedbb638be016a6cd513247e245a8c85b9b5a341c58596aea9cdcc7dbbeb19790a3d0199d02f9403e1f5fe57ee16c31c3cde8892d77e3e0097b4263

  • \Windows\SysWOW64\Hodpgjha.exe

    Filesize

    320KB

    MD5

    bd19fb2f530d0210835777a23fc07e2d

    SHA1

    23586fd4da2c63a860f043a9c32143abacf592e8

    SHA256

    55a5a1c53916759017e6a8e2386b9c6445d3d54576e426e5a398d85dc71d4975

    SHA512

    f6bdd6230d49faaf5c961fd9fbb6ba443679e41a19baad42d276a55de7cdfadbeec825566aa1b8fda89bdbfbd5b3fb7a847008d3c2da62e1efe7259b1fa8683f

  • \Windows\SysWOW64\Iagfoe32.exe

    Filesize

    320KB

    MD5

    416faa02958acfcd75f14beb07f3ff4a

    SHA1

    a1cd99471e67322c355b97330814821dd104275d

    SHA256

    51e1696622c396886cfe416b1d5e38760d341bcde4b007b703c05260ea972f6e

    SHA512

    8041128e0a7721f9941d95b9efce96cb4ad16188e50fc1d7f2d861d0c102458fa0b4e513fea689ab4ae9a6a3ff069f616c3405df7953b08772150220d5a6d91c

  • \Windows\SysWOW64\Icbimi32.exe

    Filesize

    320KB

    MD5

    44b0cce170103219b0a3537937c9e125

    SHA1

    969bd5b09f5330ab7b7f2144b428f47878900a89

    SHA256

    1f454c52bc5eb1134fb9e4decb1df050fff8f2f201af78f08eb89d937ca799cd

    SHA512

    10cb917554448f4afcf4448f3149439a0e5d6906dad7afba1a4a0e380176546822ac4fbfed5d75a6e73a91f0abb6fd1654596ee303a6164e8220ccb78e7cf577

  • memory/316-205-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1032-204-0x00000000002D0000-0x0000000000305000-memory.dmp

    Filesize

    212KB

  • memory/1032-164-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1032-221-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1072-218-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1072-134-0x0000000000440000-0x0000000000475000-memory.dmp

    Filesize

    212KB

  • memory/1072-122-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1456-207-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1684-6-0x0000000000250000-0x0000000000285000-memory.dmp

    Filesize

    212KB

  • memory/1684-0-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1684-209-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1832-220-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1832-150-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/1832-163-0x0000000000250000-0x0000000000285000-memory.dmp

    Filesize

    212KB

  • memory/2024-216-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2024-95-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2024-107-0x00000000005D0000-0x0000000000605000-memory.dmp

    Filesize

    212KB

  • memory/2096-18-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2096-210-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2096-26-0x0000000000300000-0x0000000000335000-memory.dmp

    Filesize

    212KB

  • memory/2104-80-0x0000000000440000-0x0000000000475000-memory.dmp

    Filesize

    212KB

  • memory/2104-68-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2104-214-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2340-206-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2428-149-0x0000000000290000-0x00000000002C5000-memory.dmp

    Filesize

    212KB

  • memory/2428-136-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2428-219-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2628-215-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2628-82-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2656-40-0x0000000000250000-0x0000000000285000-memory.dmp

    Filesize

    212KB

  • memory/2656-211-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2656-27-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2780-217-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2780-121-0x0000000000250000-0x0000000000285000-memory.dmp

    Filesize

    212KB

  • memory/2856-55-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2856-213-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2908-49-0x00000000002E0000-0x0000000000315000-memory.dmp

    Filesize

    212KB

  • memory/2908-212-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB

  • memory/2908-41-0x0000000000400000-0x0000000000435000-memory.dmp

    Filesize

    212KB