Analysis

  • max time kernel
    141s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    11-05-2024 14:32

General

  • Target

    0e963bdba0f7e97ca8b482b45ff22d60_NeikiAnalytics.exe

  • Size

    71KB

  • MD5

    0e963bdba0f7e97ca8b482b45ff22d60

  • SHA1

    a8fd0b52a404575fc2e8e0db0b2a5ea64e248458

  • SHA256

    c8b059b11cf655f855d8f64f2d79bf27ee2a174ed7ab96f99880ce29a7cb45ee

  • SHA512

    03ec045928f778beefc7d256de63445af97f14e37dd1ee42ab32df4ca138c108ead94dab7c518e24aba0d010de7c62614f6d6ea554b9ccd9ed3e2c52b84677d6

  • SSDEEP

    768:ZrItKyw5WHXfQmjIiIk9ecAx7pP1EPU96MyXPdtldE9bIIIwjkS:Zr3Z5IfQmv81x7pP1r3yXPdtnyjz

Score
8/10

Malware Config

Signatures

  • Sets file to hidden 1 TTPs 1 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e963bdba0f7e97ca8b482b45ff22d60_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\0e963bdba0f7e97ca8b482b45ff22d60_NeikiAnalytics.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1484
    • C:\Windows\SysWOW64\attrib.exe
      attrib +a +s +h +r C:\Windows\Debug\qqwhost.exe
      2⤵
      • Sets file to hidden
      • Drops file in Windows directory
      • Views/modifies file attributes
      PID:1240
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\0E963B~1.EXE > nul
      2⤵
      • Deletes itself
      PID:3056
  • C:\Windows\Debug\qqwhost.exe
    C:\Windows\Debug\qqwhost.exe
    1⤵
    • Executes dropped EXE
    • Checks processor information in registry
    PID:1740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Debug\qqwhost.exe

    Filesize

    71KB

    MD5

    3efff0ef8a85f21175421772de7408f8

    SHA1

    e0fbf29bfe305322e9c229cd5238e4579450f289

    SHA256

    bd01d48f5107e9d299ff117968d8ac5cc8292a2add485e6662934e46586b8b51

    SHA512

    b9a7e8425758ac7eb95b1a78e3a61c069e8bebf3c0f4358899474dbb2279fecba3d9297b93ee776afaab9634388a895d1d84e76295c46436a34f722e32db489f

  • memory/1484-0-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/1484-6-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/1740-5-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/1740-7-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB