Analysis

  • max time kernel
    142s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    13/05/2024, 17:09

General

  • Target

    bf25d0fec93985bde03765c86af798c0_NeikiAnalytics.exe

  • Size

    320KB

  • MD5

    bf25d0fec93985bde03765c86af798c0

  • SHA1

    1a571b863d34d1f422c9cc8cfedd024d471286f9

  • SHA256

    5deb82fcfe3cdd0fe0b4084291d8b4a24bf49e79df28526f5192f413dfd2a462

  • SHA512

    97ce609b80e9ed13471a0a6d20d377755547dd2a5b6b6a4d7e906bed6d00e7764e94edfa0edee88a1198c70550a878055392a6e0d5dc9474b092d4464c50a4fd

  • SSDEEP

    6144:7tatPE5TxP8ev1zQBgexOdw6rpI9FsAC9:oPwTt8Cl+zGp64

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Program Files directory 4 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bf25d0fec93985bde03765c86af798c0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\bf25d0fec93985bde03765c86af798c0_NeikiAnalytics.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2988
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c ping 127.0.0.1 -n 2&C:\Users\Admin\AppData\Local\Temp\\zzdrr.exe "C:\Users\Admin\AppData\Local\Temp\bf25d0fec93985bde03765c86af798c0_NeikiAnalytics.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2984
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1 -n 2
        3⤵
        • Runs ping.exe
        PID:1988
      • C:\Users\Admin\AppData\Local\Temp\zzdrr.exe
        C:\Users\Admin\AppData\Local\Temp\\zzdrr.exe "C:\Users\Admin\AppData\Local\Temp\bf25d0fec93985bde03765c86af798c0_NeikiAnalytics.exe"
        3⤵
        • Deletes itself
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2468
        • \??\c:\Program Files\hrcxcgai\tqlu.exe
          "c:\Program Files\hrcxcgai\tqlu.exe" "c:\Program Files\hrcxcgai\tqlur.dll",Group C:\Users\Admin\AppData\Local\Temp\zzdrr.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Enumerates connected drives
          • Writes to the Master Boot Record (MBR)
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2396

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Program Files\hrcxcgai\tqlu.exe

    Filesize

    43KB

    MD5

    51138beea3e2c21ec44d0932c71762a8

    SHA1

    8939cf35447b22dd2c6e6f443446acc1bf986d58

    SHA256

    5ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124

    SHA512

    794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d

  • \Program Files\hrcxcgai\tqlur.dll

    Filesize

    97KB

    MD5

    f952d4aeafb6290270c169079091502a

    SHA1

    418c64bc24a3617991d7a3aff63d768883e06cb0

    SHA256

    bacf6e44868d24f9af72b99323897e40859a3f5c7492ff42a364ae1f16778771

    SHA512

    27835ee8a8f3080ace43bea19aee32c69a40d59f6bbc3d6775b30ea507355814f925c37470fc1f4e7214029a34d41f5926ac24dd61e5ebc367f27a04b9803ab7

  • \Users\Admin\AppData\Local\Temp\zzdrr.exe

    Filesize

    320KB

    MD5

    09ac87d973b163fc9d9247af51488931

    SHA1

    100b8c6d669ba2d2cbbb648f37b39c7a675ab16e

    SHA256

    ae0cd793598f41593e3e6e11033b30f64c4d2d9950d5c675578eec458390ffae

    SHA512

    c66d7ed69b95127320ede6b9eba942fe6c18f789a65d61c2d85db837a6338bcaa710f4b5b98312855c1a2b9d5e8e6fe6a708d21fe82b55294d8d32cf4ff01e56

  • memory/2396-18-0x0000000010000000-0x0000000010038000-memory.dmp

    Filesize

    224KB

  • memory/2396-17-0x0000000010000000-0x0000000010038000-memory.dmp

    Filesize

    224KB

  • memory/2396-16-0x0000000010000000-0x0000000010038000-memory.dmp

    Filesize

    224KB

  • memory/2396-20-0x0000000010000000-0x0000000010038000-memory.dmp

    Filesize

    224KB

  • memory/2396-21-0x0000000010000000-0x0000000010038000-memory.dmp

    Filesize

    224KB

  • memory/2396-25-0x0000000010000000-0x0000000010038000-memory.dmp

    Filesize

    224KB

  • memory/2396-26-0x0000000010000000-0x0000000010038000-memory.dmp

    Filesize

    224KB