Analysis

  • max time kernel
    140s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    10-05-2024 02:05

General

  • Target

    46dcc2fc391188af04b65634bdfa0b60_NeikiAnalytics.exe

  • Size

    438KB

  • MD5

    46dcc2fc391188af04b65634bdfa0b60

  • SHA1

    d945fa119f41c2e33c3792319eb61d79c12bb7b6

  • SHA256

    fd397e099239c8637047d721f1eb843cf0a9742693a70120126dfee0795f7c68

  • SHA512

    8b29d95bd6b14e2bca269b89f8e7720938fe8d2b7629994ce8e7299f3b9f993925100c80d0890ba704284fbeebfffc82543aa562f06bdfa6715ced9fa5a67f14

  • SSDEEP

    6144:LdspDeDrxkg/vrMuJIgwhEFHyOrJcX/Pgqwzm5IzkWjS4e4azExBKO1t4Kb70Nqx:J8kxNhOZElO5kkWjhD4AF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies system executable filetype association 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 17 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\46dcc2fc391188af04b65634bdfa0b60_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\46dcc2fc391188af04b65634bdfa0b60_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3008
    • C:\PerfLogs\TBZ.EXE
      C:\PerfLogs\TBZ.EXE
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2932

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\OMUVHIF.EXE

    Filesize

    438KB

    MD5

    f945068c761eb1935ddf7bcd368ba331

    SHA1

    78589ec7764d7741b4ad437ac93818080ca6200e

    SHA256

    5f8cc82f1281760f06081b0f063b30abf05af826e48c97c41c7cef7e5e7cd448

    SHA512

    68497e39301394c556a0b4b05d7a1002f345b27558e6bd49ffc2ea793f00db5ef3bce83941e0c3628765b40b6a045d0ab9233da80b7eb8938f423ee607908a2f

  • \PerfLogs\TBZ.EXE

    Filesize

    438KB

    MD5

    073561d59d58fc4b4c66c9f328066b3c

    SHA1

    f61ab64d5d173346e150d9e1b8e51a84efd0326c

    SHA256

    eab1338b5e42b2a70bb1e32c4a73d9a0664e950631c614c654f217e432a92007

    SHA512

    89e0d1008720abb783b99ee795d7fef6af82780bf093553ddc294c6c47202c8ef740fac573f69f405f0d3d594189d63e2a6bc323260ab42dd345bb8acca86774

  • memory/2932-29-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/2932-30-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/2932-32-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/2932-33-0x00000000001C0000-0x00000000001C1000-memory.dmp

    Filesize

    4KB

  • memory/3008-0-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/3008-1-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/3008-27-0x0000000002140000-0x00000000021AE000-memory.dmp

    Filesize

    440KB

  • memory/3008-26-0x0000000002140000-0x00000000021AE000-memory.dmp

    Filesize

    440KB

  • memory/3008-31-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB