Malware Analysis Report

2025-03-15 06:03

Sample ID 240511-hlhpssbf6t
Target 96e6206be603549c7680a9bae8227f40_NeikiAnalytics
SHA256 ad8ba7edd6c0be50473b7a6e89fb0daf46048f0dab46fb3b03eb8759f7b8c35a
Tags
vmprotect
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

ad8ba7edd6c0be50473b7a6e89fb0daf46048f0dab46fb3b03eb8759f7b8c35a

Threat Level: Shows suspicious behavior

The file 96e6206be603549c7680a9bae8227f40_NeikiAnalytics was found to be: Shows suspicious behavior.

Malicious Activity Summary

vmprotect

VMProtect packed file

Suspicious use of NtSetInformationThreadHideFromDebugger

Unsigned PE

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-11 06:49

Signatures

VMProtect packed file

vmprotect
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-11 06:49

Reported

2024-05-11 06:52

Platform

win7-20240508-en

Max time kernel

117s

Max time network

119s

Command Line

"C:\Users\Admin\AppData\Local\Temp\96e6206be603549c7680a9bae8227f40_NeikiAnalytics.exe"

Signatures

Suspicious use of NtSetInformationThreadHideFromDebugger

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\96e6206be603549c7680a9bae8227f40_NeikiAnalytics.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\96e6206be603549c7680a9bae8227f40_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\96e6206be603549c7680a9bae8227f40_NeikiAnalytics.exe"

Network

N/A

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-11 06:49

Reported

2024-05-11 06:52

Platform

win10v2004-20240508-en

Max time kernel

136s

Max time network

153s

Command Line

"C:\Users\Admin\AppData\Local\Temp\96e6206be603549c7680a9bae8227f40_NeikiAnalytics.exe"

Signatures

VMProtect packed file

vmprotect
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious use of NtSetInformationThreadHideFromDebugger

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\96e6206be603549c7680a9bae8227f40_NeikiAnalytics.exe N/A

Enumerates physical storage devices

Processes

C:\Users\Admin\AppData\Local\Temp\96e6206be603549c7680a9bae8227f40_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\96e6206be603549c7680a9bae8227f40_NeikiAnalytics.exe"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4076,i,1809100026287847100,9768898026582633513,262144 --variations-seed-version --mojo-platform-channel-handle=3808 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://dhjcheats.com/services/update/cs2/default

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --field-trial-handle=4476,i,1809100026287847100,9768898026582633513,262144 --variations-seed-version --mojo-platform-channel-handle=4672 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --field-trial-handle=4788,i,1809100026287847100,9768898026582633513,262144 --variations-seed-version --mojo-platform-channel-handle=4448 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --no-appcompat-clear --field-trial-handle=5420,i,1809100026287847100,9768898026582633513,262144 --variations-seed-version --mojo-platform-channel-handle=5444 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5940,i,1809100026287847100,9768898026582633513,262144 --variations-seed-version --mojo-platform-channel-handle=5924 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --field-trial-handle=5608,i,1809100026287847100,9768898026582633513,262144 --variations-seed-version --mojo-platform-channel-handle=6116 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --no-appcompat-clear --field-trial-handle=4988,i,1809100026287847100,9768898026582633513,262144 --variations-seed-version --mojo-platform-channel-handle=5436 /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 17.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 status.dhjcheats.com udp
US 172.67.166.192:443 status.dhjcheats.com tcp
BE 2.17.196.65:443 www.bing.com tcp
BE 2.17.196.65:443 www.bing.com tcp
US 8.8.8.8:53 192.166.67.172.in-addr.arpa udp
N/A 127.0.0.1:49858 tcp
US 8.8.8.8:53 65.196.17.2.in-addr.arpa udp
US 8.8.8.8:53 dhjcheats.com udp
US 8.8.8.8:53 dhjcheats.com udp
US 104.21.91.52:443 dhjcheats.com udp
US 8.8.8.8:53 dhjcheats.com udp
US 8.8.8.8:53 business.bing.com udp
US 8.8.8.8:53 business.bing.com udp
US 13.107.6.158:443 business.bing.com tcp
US 8.8.8.8:53 bzib.nelreports.net udp
US 8.8.8.8:53 bzib.nelreports.net udp
US 2.17.251.4:443 bzib.nelreports.net tcp
US 8.8.8.8:53 nav-edge.smartscreen.microsoft.com udp
US 8.8.8.8:53 nav-edge.smartscreen.microsoft.com udp
GB 13.87.96.169:443 nav-edge.smartscreen.microsoft.com tcp
US 8.8.8.8:53 52.91.21.104.in-addr.arpa udp
US 8.8.8.8:53 158.6.107.13.in-addr.arpa udp
US 8.8.8.8:53 169.96.87.13.in-addr.arpa udp
BE 2.17.196.65:443 www.bing.com tcp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 static.cloudflareinsights.com udp
US 8.8.8.8:53 static.cloudflareinsights.com udp
US 8.8.8.8:53 170.185.250.142.in-addr.arpa udp
US 8.8.8.8:53 227.185.250.142.in-addr.arpa udp
US 104.16.80.73:443 static.cloudflareinsights.com tcp
US 8.8.8.8:53 www.google.com udp
US 8.8.8.8:53 www.google.com udp
DE 142.250.185.164:443 www.google.com udp
US 8.8.8.8:53 telem-edge.smartscreen.microsoft.com udp
US 8.8.8.8:53 telem-edge.smartscreen.microsoft.com udp
GB 172.165.69.228:443 telem-edge.smartscreen.microsoft.com tcp
US 8.8.8.8:53 73.80.16.104.in-addr.arpa udp
US 8.8.8.8:53 164.185.250.142.in-addr.arpa udp
US 8.8.8.8:53 232.184.250.142.in-addr.arpa udp
US 8.8.8.8:53 228.69.165.172.in-addr.arpa udp
US 8.8.8.8:53 region1.google-analytics.com udp
US 8.8.8.8:53 region1.google-analytics.com udp
US 216.239.34.36:443 region1.google-analytics.com tcp
US 8.8.8.8:53 www.google.com udp
US 8.8.8.8:53 www.google.com udp
US 8.8.8.8:53 www.google.com udp
US 8.8.8.8:53 dhjcheats.com udp
DE 142.250.185.164:443 www.google.com udp
DE 142.250.185.164:443 www.google.com udp
US 8.8.8.8:53 36.34.239.216.in-addr.arpa udp
US 8.8.8.8:53 131.185.250.142.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 32.251.17.2.in-addr.arpa udp
US 8.8.8.8:53 23.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 77.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 100.58.20.217.in-addr.arpa udp

Files

memory/1816-0-0x0000000140193000-0x00000001405F1000-memory.dmp

memory/1816-1-0x00007FF96A130000-0x00007FF96A132000-memory.dmp

memory/1816-8-0x00007FF96A1A0000-0x00007FF96A1A2000-memory.dmp

memory/1816-7-0x00007FF96A190000-0x00007FF96A192000-memory.dmp

memory/1816-6-0x00007FF96A180000-0x00007FF96A182000-memory.dmp

memory/1816-5-0x00007FF96A170000-0x00007FF96A172000-memory.dmp

memory/1816-4-0x00007FF96A160000-0x00007FF96A162000-memory.dmp

memory/1816-10-0x00007FF96A1C0000-0x00007FF96A1C2000-memory.dmp

memory/1816-9-0x00007FF96A1B0000-0x00007FF96A1B2000-memory.dmp

memory/1816-3-0x00007FF96A150000-0x00007FF96A152000-memory.dmp

memory/1816-2-0x00007FF96A140000-0x00007FF96A142000-memory.dmp

memory/1816-11-0x00007FF96A1D0000-0x00007FF96A1D2000-memory.dmp

memory/1816-13-0x00007FF96A1F0000-0x00007FF96A1F2000-memory.dmp

memory/1816-12-0x00007FF96A1E0000-0x00007FF96A1E2000-memory.dmp

memory/1816-14-0x00007FF96A200000-0x00007FF96A202000-memory.dmp

memory/1816-15-0x00007FF96A210000-0x00007FF96A212000-memory.dmp

memory/1816-17-0x00007FF96A230000-0x00007FF96A232000-memory.dmp

memory/1816-16-0x00007FF96A220000-0x00007FF96A222000-memory.dmp

memory/1816-18-0x0000000002000000-0x0000000002086000-memory.dmp

memory/1816-30-0x0000000002000000-0x0000000002086000-memory.dmp

memory/1816-24-0x0000000002090000-0x00000000020AA000-memory.dmp

memory/1816-33-0x0000000140000000-0x0000000140C76000-memory.dmp

memory/1816-32-0x0000000140000000-0x0000000140C76000-memory.dmp

memory/1816-31-0x0000000002090000-0x00000000020AA000-memory.dmp

memory/1816-37-0x0000000140193000-0x00000001405F1000-memory.dmp

memory/1816-38-0x0000000140000000-0x0000000140C76000-memory.dmp