Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    14-05-2024 18:17

General

  • Target

    0908aa405072f2c3e8dbb55f4b684030_NeikiAnalytics.exe

  • Size

    78KB

  • MD5

    0908aa405072f2c3e8dbb55f4b684030

  • SHA1

    f35e507803ff70397a6b4417ed6f69cc94b7372b

  • SHA256

    5d84c8f6c095de440c126e97159013dd950c1fc8b045d53725b87e9e08b55010

  • SHA512

    59b219a58e4b5aa09994a1e83be6f59ef8220908c3d8f2e33f0f314fa4d80ac00cc8fe29827028436fb01112ce83e60caad6c93857f87aeded6c2de050ac80b9

  • SSDEEP

    1536:t58Vdy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtC6i9/F143:t58An7N041Qqhg69/a

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0908aa405072f2c3e8dbb55f4b684030_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\0908aa405072f2c3e8dbb55f4b684030_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1752
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ipqoztm0.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2444
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESEFF.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcEFE.tmp"
        3⤵
          PID:2364
      • C:\Users\Admin\AppData\Local\Temp\tmpE05.tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\tmpE05.tmp.exe" C:\Users\Admin\AppData\Local\Temp\0908aa405072f2c3e8dbb55f4b684030_NeikiAnalytics.exe
        2⤵
        • Deletes itself
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        PID:2764

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RESEFF.tmp

      Filesize

      1KB

      MD5

      8bef4963eefd5c1350721c921c73a6fd

      SHA1

      854547cc23931d8446eeb8a939919baa18d2fd6a

      SHA256

      8e88dbd365c0ef76e3e1f17cdedec54c0305c17f2b9977b15fbc163d18d4b884

      SHA512

      a3d2f88bc3734cb224b034e26e37ef1329ae75d1aae01e525349460678758ec90a326556b10716a26361d86b77c04a9906b2c9454b982a0a8e7e6a23c5d87b44

    • C:\Users\Admin\AppData\Local\Temp\ipqoztm0.0.vb

      Filesize

      14KB

      MD5

      5b2e8fbc43b819a743ef0effaa9318e8

      SHA1

      7636ad58fe04da20305880e31fbd9289ff69279e

      SHA256

      83963a21e24216925eeac45b3514e5cf5608e817f856cf6fab3e10af52c53b34

      SHA512

      337d74f7898e94c3445aea8477c2b520ea883142557fcf0a5bc619d43809b11ee7b3223ab6899ae3f353979dd11da73f126d9d919e094715310c911ad6bf3dee

    • C:\Users\Admin\AppData\Local\Temp\ipqoztm0.cmdline

      Filesize

      265B

      MD5

      2f831c64d52d89084d73619e11cfe208

      SHA1

      132e7c78c52e7d3c66f2d7a64ec40cfebe1a6db0

      SHA256

      0e0ad2d69f943629a6b0dce6a67902d8fc66e04a7063357a2033a4098ffcc606

      SHA512

      7a57b52e7517d98b6bf2ce32b48cfe0bd97c8b8ba8a3e2f5a2c702299e6514ac456409cf7c357b2c37a2570ae6253d55cea4ebb8fa41026d33da9117f094240b

    • C:\Users\Admin\AppData\Local\Temp\tmpE05.tmp.exe

      Filesize

      78KB

      MD5

      fc421d0a00d6ff648bf76a162b99c0d0

      SHA1

      cbe537f784747ec72dc37be69a1f0083bda38f43

      SHA256

      a84a283a4801b198f5ef1a44886520795e499c5797941816556bd8c2a34563e6

      SHA512

      ce5f4578c4f3624e07d0559efbefa375d961dc97dbc3cb651f0f011014ccb0d30b885821d89421570a1316f8aa4c91858fbdeeb575a1fc7ba7b558019ae94e9e

    • C:\Users\Admin\AppData\Local\Temp\vbcEFE.tmp

      Filesize

      660B

      MD5

      8662a00c0a86fcd78092cac8d12f7ac7

      SHA1

      eb0bd52f284876d113fcab1d8df94af4c516baa8

      SHA256

      18f582b49439b5a20cc0d71060689e6486372f1e3b79d8c413ec44c8f7d5fe8a

      SHA512

      0466f34c97388809bd268088e4909fc158791117d3afde98c45c6753b9bcc319e90a849095013b8a14ccb2927d216ca7d8cda9c62e8d7112f087cad5492307c5

    • C:\Users\Admin\AppData\Local\Temp\zCom.resources

      Filesize

      62KB

      MD5

      aa4bdac8c4e0538ec2bb4b7574c94192

      SHA1

      ef76d834232b67b27ebd75708922adea97aeacce

      SHA256

      d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430

      SHA512

      0ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65

    • memory/1752-0-0x0000000074361000-0x0000000074362000-memory.dmp

      Filesize

      4KB

    • memory/1752-1-0x0000000074360000-0x000000007490B000-memory.dmp

      Filesize

      5.7MB

    • memory/1752-2-0x0000000074360000-0x000000007490B000-memory.dmp

      Filesize

      5.7MB

    • memory/1752-23-0x0000000074360000-0x000000007490B000-memory.dmp

      Filesize

      5.7MB

    • memory/2444-8-0x0000000074360000-0x000000007490B000-memory.dmp

      Filesize

      5.7MB

    • memory/2444-18-0x0000000074360000-0x000000007490B000-memory.dmp

      Filesize

      5.7MB