Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 04:46
Behavioral task
behavioral1
Sample
72a7643adcbe44f5df8108d97d978380_NeikiAnalytics.exe
Resource
win7-20240215-en
General
-
Target
72a7643adcbe44f5df8108d97d978380_NeikiAnalytics.exe
-
Size
361KB
-
MD5
72a7643adcbe44f5df8108d97d978380
-
SHA1
5974611d984cb5965d32cc1fea2f0190ffcadc92
-
SHA256
699f26145d68019ba8737eafd721d6cffeada6cddebcaa94599bcce9cac9205d
-
SHA512
36d232231db8808bba531e10ec0e46dab2de013c335b6aa3e95225d8db9c20eeb4264de947d62c203bd1f6de4a8b62cd41b31f5751fc6c75e0b6fa73809a196c
-
SSDEEP
6144:PuOogy7brXN3OMxBxWjKq28FvcIR2GQilr0caF9x8:PuOA7b56rP
Malware Config
Extracted
urelas
112.175.88.208
112.175.88.209
112.175.88.207
Signatures
-
Deletes itself 1 IoCs
pid Process 1704 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1856 huter.exe -
Loads dropped DLL 1 IoCs
pid Process 2416 72a7643adcbe44f5df8108d97d978380_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2416 wrote to memory of 1856 2416 72a7643adcbe44f5df8108d97d978380_NeikiAnalytics.exe 28 PID 2416 wrote to memory of 1856 2416 72a7643adcbe44f5df8108d97d978380_NeikiAnalytics.exe 28 PID 2416 wrote to memory of 1856 2416 72a7643adcbe44f5df8108d97d978380_NeikiAnalytics.exe 28 PID 2416 wrote to memory of 1856 2416 72a7643adcbe44f5df8108d97d978380_NeikiAnalytics.exe 28 PID 2416 wrote to memory of 1704 2416 72a7643adcbe44f5df8108d97d978380_NeikiAnalytics.exe 29 PID 2416 wrote to memory of 1704 2416 72a7643adcbe44f5df8108d97d978380_NeikiAnalytics.exe 29 PID 2416 wrote to memory of 1704 2416 72a7643adcbe44f5df8108d97d978380_NeikiAnalytics.exe 29 PID 2416 wrote to memory of 1704 2416 72a7643adcbe44f5df8108d97d978380_NeikiAnalytics.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\72a7643adcbe44f5df8108d97d978380_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\72a7643adcbe44f5df8108d97d978380_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\huter.exe"C:\Users\Admin\AppData\Local\Temp\huter.exe"2⤵
- Executes dropped EXE
PID:1856
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- Deletes itself
PID:1704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD502167b944a214fee3d34f9a7e356dc6a
SHA1ca5b3f38a7151268726401593eb35f9b67bdde97
SHA25677fcdadc9ba56daa81edb3f0ef876e38a8c7de56187c28c7d02992cd9e0a243d
SHA512c8976c66724d737105a66699673052d7bc7f1e1941c91e03f97452aaba714d35b1d55434e950b00c58626b8bcf16186a731cccc503b7ba08f080ead3eaca5817
-
Filesize
304B
MD51f336680ff4aecdb1bcf5f302a265f16
SHA1e37b9f2e53ca218adbe40fcc4ec34418294639e9
SHA25698c52c674235e241454f1d263952d336359d4171dfda81668d1af05aed0e8809
SHA5129feada4ae3c3b25184eb5ab96d40ae48e5758a49bfaef51a835f891b41db20c289443db6b6cb3b2e18dc7718bdf01cd623559d48abf31e4fc4275b303a6a151c
-
Filesize
361KB
MD5d7bfb778e6dd55ae3d1af3e2d1b6a890
SHA18b52479b417468741a6b3db58ef208b1de8e8247
SHA2566b387ff35819df6d756b9cc1d37ad6d4e6f3036af91442b0dd27d9a8df68298e
SHA512af53e90861f0011c1a7632603fe314a4c96c150b2a3dd587b406a6d5910b8f3ed96d6533a779044104c110df0f52b2469453ba785122eeb8419ed81b8845b5a8