Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 13:29
Static task
static1
Behavioral task
behavioral1
Sample
c8921cc603b0ef43c3f937402ec14fa0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
c8921cc603b0ef43c3f937402ec14fa0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
c8921cc603b0ef43c3f937402ec14fa0_NeikiAnalytics.exe
-
Size
12KB
-
MD5
c8921cc603b0ef43c3f937402ec14fa0
-
SHA1
8dfcb6e2ec2d2ac031b8dfa5f9ca99cce9064cf6
-
SHA256
6cd60d249bf3bd93bfca7f77b1645ce6a5488e809a626959b9fe6983e5b62220
-
SHA512
4955ae38a8105cd2366544ebadf4c0fed87b1586b008a98bdf825e4c02de542deea388b4d1adfb1e7e951a1ba4568eca3e0ceb7f07af6d156f6f56a8976b0279
-
SSDEEP
384:vL7li/2zdq2DcEQvdhcJKLTp/NK9xaeo:DdM/Q9ceo
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2600 tmp1F83.tmp.exe -
Executes dropped EXE 1 IoCs
pid Process 2600 tmp1F83.tmp.exe -
Loads dropped DLL 1 IoCs
pid Process 2580 c8921cc603b0ef43c3f937402ec14fa0_NeikiAnalytics.exe -
Uses the VBS compiler for execution 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2580 c8921cc603b0ef43c3f937402ec14fa0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2580 wrote to memory of 2232 2580 c8921cc603b0ef43c3f937402ec14fa0_NeikiAnalytics.exe 28 PID 2580 wrote to memory of 2232 2580 c8921cc603b0ef43c3f937402ec14fa0_NeikiAnalytics.exe 28 PID 2580 wrote to memory of 2232 2580 c8921cc603b0ef43c3f937402ec14fa0_NeikiAnalytics.exe 28 PID 2580 wrote to memory of 2232 2580 c8921cc603b0ef43c3f937402ec14fa0_NeikiAnalytics.exe 28 PID 2232 wrote to memory of 2700 2232 vbc.exe 30 PID 2232 wrote to memory of 2700 2232 vbc.exe 30 PID 2232 wrote to memory of 2700 2232 vbc.exe 30 PID 2232 wrote to memory of 2700 2232 vbc.exe 30 PID 2580 wrote to memory of 2600 2580 c8921cc603b0ef43c3f937402ec14fa0_NeikiAnalytics.exe 31 PID 2580 wrote to memory of 2600 2580 c8921cc603b0ef43c3f937402ec14fa0_NeikiAnalytics.exe 31 PID 2580 wrote to memory of 2600 2580 c8921cc603b0ef43c3f937402ec14fa0_NeikiAnalytics.exe 31 PID 2580 wrote to memory of 2600 2580 c8921cc603b0ef43c3f937402ec14fa0_NeikiAnalytics.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8921cc603b0ef43c3f937402ec14fa0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\c8921cc603b0ef43c3f937402ec14fa0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\vu313poh\vu313poh.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES21A4.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc4AE4562C7AE3474D81D9BFC7E0F049AC.TMP"3⤵PID:2700
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp1F83.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp1F83.tmp.exe" C:\Users\Admin\AppData\Local\Temp\c8921cc603b0ef43c3f937402ec14fa0_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
PID:2600
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5e6ff00a6a120be357b594be99212a0c9
SHA1ce869a0a0d600bb3fc7227fb0acfe7f850dd4ff2
SHA256a836edf2b96a57ff48d1b8b1a960386098ea958ce9b4cdacb7e1fe800945e2de
SHA512f34394ab42ef650fc1a7169627b7aed154df7bc91daf024750a2f72ec769aa1f2d63969d3d2878e36c08b4992ba933852bf0d6689c705638e198ecf7668a0d46
-
Filesize
1KB
MD5b1a8c684bba9f8793f1ea8cf10a7dfc6
SHA16678d72ffe07bc42774c27a1fbc887ac0ec35bf7
SHA25628a004fa736ffa2dabb7ea53847f19589a0ccc325b82a02470500df959bbf1d0
SHA512a0c970b177a8e302f42f2e623d5100363578c23d3c94dfc4cbfbd585ea0ad83207eb8c00644f3a634b35d5c32a7311aeb6097608a435e5cc1655dbd705adf9bc
-
Filesize
12KB
MD5e93b3a357908e198400373cbfb60dff0
SHA128bf41ab3c433e7380b6a4130e5b8bb20bbba397
SHA2564fb196b7a8c6bc24395f829089497ff620f72392ebed980078ed019c7b450383
SHA5123ac112b87298b8c1338390436c3eadf1271cbdfd7df6f1b0a2d76d58174f2586af8e97e1d6a6791fa64ffda3810acaa9ebd3a914303200375c1607eb1e12609b
-
Filesize
1KB
MD5e48aeb70ecfa57c8fc839872eaf23a83
SHA1d54603521d064fa2eb44a83c48d8607fa32242db
SHA2565211b6440471b1105457dbfca201f66afaef7872d167b22b07d536ec9022dc7a
SHA512576f5f13bde8b3b69e816de742c08c18d5dead53f9122b763bb4fe33d129baac5c4ee1272155a04413893895d8620681a626f33bea76c5524e0efcfbe472b5d3
-
Filesize
2KB
MD52b5127c82c081b314b84da97b5ebb860
SHA101248f3ab2416e8c4d5fff9b682ef4ab59373863
SHA256feb469832965c9f0fd61dc9c7433b10fe060e02cb6e5cee6708f2bcd788a8039
SHA512c2f5c1874d5a823d00f8fe6b8126b254ffde6d94c8f98c0538fe24ea9449086cbe36851b52737c4aed7e7a6e88952cdc569939dd852d7bb3d0b964db4ab32f40
-
Filesize
273B
MD5c0dcb9b70087be49a61a50e2c1097942
SHA1c1a5adb0f9cd7148e2a8b06e241b87548ebb5b29
SHA256758ad8f4cdedd703902d4ad6540dff6c2135b55c604b7f9cf06fd3eea5555310
SHA512e4a77d162ed2277ddf046219165b8ab549debad07fdd70a6e518eccf07a7f64535dd7f1fd863074973d70767db1f16c3ed546e5c2cec322e803f85c5ac3a591f