Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    12-05-2024 01:41

General

  • Target

    582806b6ce770cf9f445beba14a86ae0_NeikiAnalytics.exe

  • Size

    9.3MB

  • MD5

    582806b6ce770cf9f445beba14a86ae0

  • SHA1

    c106e58e2f849384c367d8193d8b1c4882b02b05

  • SHA256

    8ed25e9eacdeebd9c66233445c19d9d2b3c8d3219e22d633ad0c9dcec6cd3879

  • SHA512

    254bdf7e8cec038452388a4081c85f69e524b4d1e3926842f52b85a4288c6dd0cd23127c452086e45f095dbb6ff3357069c1b95ee13f3643a4feec193fd4cee4

  • SSDEEP

    196608:CQtXoXxTDFjkyISOtEOYlxW0LPZ7RCRLnRQhZGMAxy:J6X1JAyctEOeW0LPZsYE7xy

Score
7/10
upx

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 3 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies registry class 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\582806b6ce770cf9f445beba14a86ae0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\582806b6ce770cf9f445beba14a86ae0_NeikiAnalytics.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1956
    • C:\Windows\SysWOW64\MSIEXEC.EXE
      MSIEXEC.EXE /i "C:\Users\Admin\AppData\Local\Temp\{14BBCB9A-144C-4A68-A524-BBCED75CD658}\Nexus Radio.msi" SETUPEXEDIR="C:\Users\Admin\AppData\Local\Temp"
      2⤵
      • Enumerates connected drives
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:2700
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2388
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 56D0F1D0BAC2F8E9F503DD15C0175EA3 C
      2⤵
      • Loads dropped DLL
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2872
      • C:\Users\Admin\AppData\Local\Temp\{C1338B0E-48B0-4ADF-8ABE-B50DDB9A216B}\ISBEW64.exe
        C:\Users\Admin\AppData\Local\Temp\{C1338B0E-48B0-4ADF-8ABE-B50DDB9A216B}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{64C944EC-82E7-494D-84C4-FFFAB718F121}
        3⤵
        • Executes dropped EXE
        PID:2852

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\InstallShield\ISEngine12.0\IsBE.dll

    Filesize

    52KB

    MD5

    9cf7faee57a20bf15a2fc9b423ebc512

    SHA1

    12cbf4d0a941bd5a8f847754fdaf4841e7751cce

    SHA256

    d34f26d85bfb94a5f017fdaf58b94ecf9553919d2aa9a9955ff0a2e3d7c11e4a

    SHA512

    44c715be4a98b9ce99c6d926500be3e365f8a08a4d8c85ae9342dc9ce76de29544f14acbf42d69f7f9e40ebdf0c6faa8cb5d4b3fc9d523479b12cf0823678672

  • C:\Users\Admin\AppData\Local\Temp\MSI1DFC.tmp

    Filesize

    84KB

    MD5

    abb81f7897bb48a036686ccf840287ae

    SHA1

    d6d648782584340bfa56c8e6d34fd70707af5d36

    SHA256

    9dc871199cc9e96067a32401d225af50683ac14efaf35edc61aa45f346374494

    SHA512

    4769d555b95ad593eae41e1cb91a9c7539b1c115b9b19a4954dec791f4d662388b459e3b7ad2964d5e0db4270406816582986d5a184bf55fd6c067906c2e0b25

  • C:\Users\Admin\AppData\Local\Temp\MSI1E4B.tmp

    Filesize

    1.7MB

    MD5

    8c53ecb3b43ee509470d9c4bc31b197a

    SHA1

    d4630ea799ed08f506378e72b6cd8c1f8ad93800

    SHA256

    c7cf14e211309f491787507e1032a3e46b4493ffa8c8c420ac85641991db21e7

    SHA512

    eee81fa361bdbdadc10aca77ca59f424123c3aa51a8452feca95875671979cf9160594acc2c2a097c0bb6bf74687a6c67ddffa7c37c274ac26a99fad9ee2a1ee

  • C:\Users\Admin\AppData\Local\Temp\{14BBCB9A-144C-4A68-A524-BBCED75CD658}\0x0409.ini

    Filesize

    5KB

    MD5

    52d179ad79966752ec40a678fd8b0062

    SHA1

    f12df9b03090286d1093b5421aea3acc358cc032

    SHA256

    57e020c41ad0566fb55415a40167a0c3da89584bc4e5f961d8e8c646f80c5590

    SHA512

    b5fb5002f1947a765a83c9a960c378b04adfe7acebbd8be79dca07c73d7ff96f5e988d8b6995c8ba6156a74ecdb0084e543090704080ea3095dbb80835cdf9c5

  • C:\Users\Admin\AppData\Local\Temp\{14BBCB9A-144C-4A68-A524-BBCED75CD658}\Nexus Radio.msi

    Filesize

    9.0MB

    MD5

    781d3ac22ad8e39b7618e2346d138c92

    SHA1

    e0a75f051095f87a3e2e618cf576f622d62213bf

    SHA256

    3f29e48c9626a3be505b908575a3b98bc3851cdfd24f61d9aa9734e6fc15832d

    SHA512

    22e7a2d3d0a7aa6654a08c70475ace1cef6eeb8f8b2df9bf4d71b4a2a8ee9ef56b611aee8a381102b109b8a6025d053b20643260b398bb859eb16ca71f97e8ab

  • C:\Users\Admin\AppData\Local\Temp\{14BBCB9A-144C-4A68-A524-BBCED75CD658}\Setup.INI

    Filesize

    1KB

    MD5

    7b4a2ef9d08948107079b125c4e97c78

    SHA1

    1a0cfd81a83488ad46c26bdef96519c8908c328b

    SHA256

    07c60bd22ce90b7458bb335aa39977f4d8067780bcddc010d987d8b439d7d191

    SHA512

    969a69dc2367b29edda8df1d7b06afdd1d6b3efa06a2b109f212d1526b478c2ec288a8076ccd36844433edfbb7e2027dc4a1d4d5b28a6f89f21d7b16b24abdf0

  • \Users\Admin\AppData\Local\Temp\{C1338B0E-48B0-4ADF-8ABE-B50DDB9A216B}\ISBEW64.exe

    Filesize

    68KB

    MD5

    4b56c021299344676f123fcb48f53c1e

    SHA1

    cbef3152c477c9176120030b164a4a807b527d8e

    SHA256

    0444971c7c19df0c4e5f8ad75c12ac277638470460eb7747122539960ed5e99f

    SHA512

    097bbc9f0140e9a14e494b6569e38b88ad390d6befa03e75a8c671e2e5fd93ee55ad50994733c957c32c85f2061d6f4d32b4b8257b3b44d5924ca10e940f779a

  • \Users\Admin\AppData\Local\Temp\{C1338B0E-48B0-4ADF-8ABE-B50DDB9A216B}\ISRT.dll

    Filesize

    203KB

    MD5

    b35dde51d14f9400e73196693148734e

    SHA1

    9410c5268f5558e57d044780d0d5dcc7aa181299

    SHA256

    70fa7f0aa2feb397597b2785a4bfdb2c9cd36e0edb51f4f0dfe6ac086290ac86

    SHA512

    6bb24c8864078c923007c1818bb0a590ebe84e2fbe6f2642dc951b05c42da1c33861f150c4ea8943657259c1c309a69b8cb1817b6a207cb9e577bc3aa8bfa79d

  • \Users\Admin\AppData\Local\Temp\{C1338B0E-48B0-4ADF-8ABE-B50DDB9A216B}\_isres.dll

    Filesize

    120KB

    MD5

    e54601d8a464a455de081d63d4b7927d

    SHA1

    0ff6da399c123394cca3b4cc64a41d8037787b73

    SHA256

    1e154a29673d129414ab56b995d04afcfa1a02af47dabaa28cd11c25f7d6026a

    SHA512

    5a213430fb8dc6a19c24122f8d9cd03479ee7ae421eac77d1026f16bf520a1f113d43380e2a60d5f0133e09aa7ad323a7ef9d1cccc3eea1e905f09701b118e05

  • memory/2872-75-0x0000000010000000-0x0000000010196000-memory.dmp

    Filesize

    1.6MB

  • memory/2872-103-0x0000000002F10000-0x0000000002F9E000-memory.dmp

    Filesize

    568KB

  • memory/2872-107-0x00000000030C0000-0x0000000003150000-memory.dmp

    Filesize

    576KB

  • memory/2872-128-0x0000000010000000-0x0000000010196000-memory.dmp

    Filesize

    1.6MB

  • memory/2872-129-0x0000000002F10000-0x0000000002F9E000-memory.dmp

    Filesize

    568KB