Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    13/05/2024, 08:22

General

  • Target

    a9ba08d7069992a37365e69f3e2cc940_NeikiAnalytics.exe

  • Size

    77KB

  • MD5

    a9ba08d7069992a37365e69f3e2cc940

  • SHA1

    4e134f610fd59410f57c7c82171edbfa2acb3f8f

  • SHA256

    cea44802804cdf57c792af629c62a52994f06850ec9eaec0a9143fca617273ad

  • SHA512

    ae5e1ef4f84677b8f711d16dc62855a77c758a82aec7c8a026665a0ac0e06ebfd5f1a2f33b7f39e11b104760adcb26e9588cafd923e10bcecfaa5dda9d326138

  • SSDEEP

    1536:+9M0Erd15Bx8pEttgdO/mXpgWXOJgQmmogDcMH5fCVsJVafuegWXAi+oX9tWV0RX:+9M0Erd15Bx8pEttgdO/mXpgWXOJgQm/

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a9ba08d7069992a37365e69f3e2cc940_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\a9ba08d7069992a37365e69f3e2cc940_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2964
    • C:\Users\Admin\qdgeb.exe
      "C:\Users\Admin\qdgeb.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2112

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\qdgeb.exe

          Filesize

          77KB

          MD5

          0819f144b3d1b9e8deedb8eb50f85455

          SHA1

          82d4e7f20e51efd1f1b52b6f388f8ed811263ef2

          SHA256

          14cf7794d2df6c395ab48f2f07dc6b753d7e55ca91e9971acea628a00ba359b9

          SHA512

          cf42fcd1640858b7842f3c6150d642120db694d45154366168cf4c3db8fc9bc19124fde6c0121f13bbe6405f380f92b2b583b5de7b5b60c9f2637785e80fd803

        • memory/2112-16-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/2964-0-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/2964-8-0x0000000003A60000-0x0000000003A78000-memory.dmp

          Filesize

          96KB

        • memory/2964-15-0x0000000003A60000-0x0000000003A78000-memory.dmp

          Filesize

          96KB