Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    14/05/2024, 11:47

General

  • Target

    c529aad9a5e5517f1f3081f1d7cfb070_NeikiAnalytics.exe

  • Size

    31KB

  • MD5

    c529aad9a5e5517f1f3081f1d7cfb070

  • SHA1

    8b03c46e2491515617029599176f63ba2d88938a

  • SHA256

    609e330855e58440ed61bf7baefed004dee1cd18d9b4e4ca48162db8fdc65a1d

  • SHA512

    e2ac8b6ac7313f7f6d1410832af46ea8b449ff37ce5b40b08604dad364885e3982ba1072f64b9f5cbbffc7526f3d21d1259841e07fa1ac5df1a4a0e9ef5642fb

  • SSDEEP

    768:GuneDDjFFupeig+ZqmjGU8zHTHXzXHCzcsHizTxavc:GunUg40jGU4j5j0vc

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c529aad9a5e5517f1f3081f1d7cfb070_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\c529aad9a5e5517f1f3081f1d7cfb070_NeikiAnalytics.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2936
    • C:\Users\Admin\Admin.exe
      "C:\Users\Admin\Admin.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:316

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\Admin.exe

          Filesize

          31KB

          MD5

          baaf0027a0d932a38e9ce227a559c74a

          SHA1

          c121e41fcb7532ad32058592c2d2d81f29bd0e0e

          SHA256

          5f90213bb5be3362fbccc7d8003b1e932b1fea13d4785ac56801b7cf850a39ae

          SHA512

          988dd0712a867aa3bfc2dc586f6b48210fb8da934b58e4a82c894d102d9aab6275ca1d05550af36ccfae35f69881634d98ff3b3eb92350104380cf3b26feba15

        • memory/316-13-0x0000000000400000-0x000000000040C000-memory.dmp

          Filesize

          48KB

        • memory/2936-0-0x0000000000400000-0x000000000040C000-memory.dmp

          Filesize

          48KB