Overview
overview
10Static
static
3c09c46023f...cs.exe
windows7-x64
10c09c46023f...cs.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3uninst.exe
windows7-x64
7uninst.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
14-05-2024 09:41
Static task
static1
Behavioral task
behavioral1
Sample
c09c46023f6168d6a7a187c0b3825f90_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
c09c46023f6168d6a7a187c0b3825f90_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
uninst.exe
Resource
win7-20240220-en
Behavioral task
behavioral12
Sample
uninst.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240426-en
General
-
Target
uninst.exe
-
Size
77KB
-
MD5
3480cddfab2ad4fb9166adb1d1bfa37a
-
SHA1
9004b51c1c6855ebae9dbf15a13ed9856637c872
-
SHA256
c4b87136cac18013c7e218730481542d3f68f67a3ec830018517802872996084
-
SHA512
e2052bbeb1ff67dc1c2be223f6d26d29a04ba4c24f287e7e251600d4eb9849953eee105e3a61d46b08ee683c3693363df08513dc04fdfcbfa335e387cf882375
-
SSDEEP
1536:fU+dcy3fxBk9UmZHs/hc/UYRN6QcIG3jAH5Hskb4:fNzPHk9Mpc/UqSo6kc
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1492 Un_A.exe -
Executes dropped EXE 1 IoCs
pid Process 1492 Un_A.exe -
Loads dropped DLL 1 IoCs
pid Process 1492 Un_A.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral12/files/0x000700000002340c-4.dat nsis_installer_1 behavioral12/files/0x000700000002340c-4.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2488 wrote to memory of 1492 2488 uninst.exe 83 PID 2488 wrote to memory of 1492 2488 uninst.exe 83 PID 2488 wrote to memory of 1492 2488 uninst.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\uninst.exe"C:\Users\Admin\AppData\Local\Temp\uninst.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe"C:\Users\Admin\AppData\Local\Temp\~nsuA.tmp\Un_A.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
PID:1492
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5ea60c7bd5edd6048601729bd31362c16
SHA16e6919d969eb61a141595014395b6c3f44139073
SHA2564e72c8b4d36f128b25281440e59e39af7ec2080d02e024f35ac413d769d91f39
SHA512f9dc35220697153bb06e3a06caf645079881cb75aed008dbe5381ecaf3442d5be03500b36bbca8b3d114845fac3d667ddf4063c16bc35d29bbea862930939993
-
Filesize
77KB
MD53480cddfab2ad4fb9166adb1d1bfa37a
SHA19004b51c1c6855ebae9dbf15a13ed9856637c872
SHA256c4b87136cac18013c7e218730481542d3f68f67a3ec830018517802872996084
SHA512e2052bbeb1ff67dc1c2be223f6d26d29a04ba4c24f287e7e251600d4eb9849953eee105e3a61d46b08ee683c3693363df08513dc04fdfcbfa335e387cf882375