Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-05-2024 04:23
Behavioral task
behavioral1
Sample
7c2827ed0020fe6dedb95d9b329de460_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7c2827ed0020fe6dedb95d9b329de460_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
7c2827ed0020fe6dedb95d9b329de460_NeikiAnalytics.exe
-
Size
138KB
-
MD5
7c2827ed0020fe6dedb95d9b329de460
-
SHA1
a74123601a89166ac88abfdfea9e857903abefd9
-
SHA256
33bcca4963612bb10c2c64d262b9939d2a1e596e8db408fe338d6299abe51bb5
-
SHA512
41d3cf593736981260b356e6a1acf9e56d82898a98a66282b6b91cf3d72ea36b074d0ea1d3c78b65ab1dd11e018639646bb1b659f3fd536fbdee487a7db2a4e5
-
SSDEEP
3072:+OpFhrH21lww+dvnNjC5zxFiMxkqC4giUvQkuPcA1Khe2yU:Jp7H2fadvNu5zKIpC4gnvQkw71IyU
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
resource yara_rule behavioral1/files/0x0031000000014665-6.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 2580 dbilzqh.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\zxoabnc.dll dbilzqh.exe File created C:\PROGRA~3\Mozilla\dbilzqh.exe 7c2827ed0020fe6dedb95d9b329de460_NeikiAnalytics.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1724 7c2827ed0020fe6dedb95d9b329de460_NeikiAnalytics.exe 2580 dbilzqh.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2580 2872 taskeng.exe 29 PID 2872 wrote to memory of 2580 2872 taskeng.exe 29 PID 2872 wrote to memory of 2580 2872 taskeng.exe 29 PID 2872 wrote to memory of 2580 2872 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c2827ed0020fe6dedb95d9b329de460_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\7c2827ed0020fe6dedb95d9b329de460_NeikiAnalytics.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:1724
-
C:\Windows\system32\taskeng.exetaskeng.exe {ACCA006A-5D4E-48B3-8652-3DB78080FC04} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\PROGRA~3\Mozilla\dbilzqh.exeC:\PROGRA~3\Mozilla\dbilzqh.exe -kwinamg2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2580
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
138KB
MD52a841962e968411471832c351bcdb9b4
SHA1fa39d01367353854402e1a6b006049521106f99f
SHA256ea37be2d474f913013ddde3617f225afd2075cd0537a61daf6b205c947572472
SHA5126435381f1af7fb76ad6991cd573fac8e1e97af4a9579114e0fafdcc7cc2c00ab5aa4b68df68dd9fb293b8b3fc987fe161c9a6b91f2dacdc2918060d3be35e4b2