Analysis

  • max time kernel
    144s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    10/05/2024, 12:04

General

  • Target

    da97457556fc960c5867a9f64ec721a0_NeikiAnalytics.exe

  • Size

    1.8MB

  • MD5

    da97457556fc960c5867a9f64ec721a0

  • SHA1

    44cdd3e69c50e83fab5a6a1462f5fcb509b45670

  • SHA256

    48b0e7169f13cc51d4cd94a4f1fc216acd0abe7b79100667fbcf2926ec0059ec

  • SHA512

    87d21f2fda3fb2aeb2fdac5124e6cc3257637070b707426a29b0a30fc2a763b38e97f190885930d9fbba5cf3fc7a8bf8034b27e52fc7d1fc0ab72cfbf5e0c2c3

  • SSDEEP

    49152:C1Hkb0dMwf2lxuA4XF/bqpj4F61l7m+PjApSy2:0Hkb0dM7Ewpje61lyq8My2

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\da97457556fc960c5867a9f64ec721a0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\da97457556fc960c5867a9f64ec721a0_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2824
    • C:\Users\Admin\AppData\Local\Temp\116E.tmp
      "C:\Users\Admin\AppData\Local\Temp\116E.tmp" --pingC:\Users\Admin\AppData\Local\Temp\da97457556fc960c5867a9f64ec721a0_NeikiAnalytics.exe 3A91D8F61341F8C9FA279D52025913716345E3B0653A0B4A2D4ED01E3F99A6FF5E3A9BDCF455ACBDCD104B53355E858B5457D5B67486FE826428A03634F69B82
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:2064
      • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
        "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\da97457556fc960c5867a9f64ec721a0_NeikiAnalytics.docx"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:2948

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\da97457556fc960c5867a9f64ec721a0_NeikiAnalytics.docx

    Filesize

    19KB

    MD5

    4046ff080673cffac6529512b8d3bdbb

    SHA1

    d3cbc39065b7a55e995fa25397da2140bdac80c1

    SHA256

    f0c1b360c0b24b5450a79138650e6ee254afae6ce8f6c68da7d1f32f91582680

    SHA512

    453f70730b7560e3d3e23ddfa0fe74e014753f8b34b45254c1c0cf5fec0546a2b8b109a4f9d096e91711b6d02cb383a7136c2cb7bd6600d0598acf7c90c25418

  • \Users\Admin\AppData\Local\Temp\116E.tmp

    Filesize

    1.8MB

    MD5

    8abd62bbe26346ca1d6fa201254fdfdd

    SHA1

    5ada8776f0d0b3cf601fa8232c52ac091c65d41a

    SHA256

    59e9dee139cbba43ae831e10bf4fff4426be756a47f78f2c4aed66dc3432430d

    SHA512

    82b88c60d792665a6c30485f2db621641201a74c90ba461bbe07b45604bb6df235d5ccddd0d3cafa654d11390773c29622f02c9899c518d352bea109123fa604

  • memory/2948-7-0x000000002F5D1000-0x000000002F5D2000-memory.dmp

    Filesize

    4KB

  • memory/2948-8-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2948-9-0x0000000070F4D000-0x0000000070F58000-memory.dmp

    Filesize

    44KB

  • memory/2948-13-0x0000000070F4D000-0x0000000070F58000-memory.dmp

    Filesize

    44KB