Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15-05-2024 01:13

General

  • Target

    56f41dc0e9a59b6873b0fee0e14af350_NeikiAnalytics.exe

  • Size

    12KB

  • MD5

    56f41dc0e9a59b6873b0fee0e14af350

  • SHA1

    751df401db269d0f9bb06226601cd846baecfc32

  • SHA256

    9c9fb9a4edb24ab10411760b917cc7db8da2ff00ada172d30701f35d5c32876c

  • SHA512

    be1bf8e82285b94a484fbbdda812464544223cad365f50b8d513ec889380b58a6032cf7bc2036d2cbf3944f2fe54b13c3bbc7f6d4c29c4b47e5027508567e818

  • SSDEEP

    384:GL7li/2zGq2DcEQvdQcJKLTp/NK9xaf/:gGMCQ9cf/

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\56f41dc0e9a59b6873b0fee0e14af350_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\56f41dc0e9a59b6873b0fee0e14af350_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1460
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\qrqzftgo\qrqzftgo.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1704
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES319B.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc947CECBAEADC47E193A3C24ABD498D32.TMP"
        3⤵
          PID:3020
      • C:\Users\Admin\AppData\Local\Temp\tmp3045.tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\tmp3045.tmp.exe" C:\Users\Admin\AppData\Local\Temp\56f41dc0e9a59b6873b0fee0e14af350_NeikiAnalytics.exe
        2⤵
        • Deletes itself
        • Executes dropped EXE
        PID:2624

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RE.resources

      Filesize

      2KB

      MD5

      159c107fd08487bb3d3b18121ceab8c4

      SHA1

      bacf0634e95321c489fa9c04884f1a90696e07af

      SHA256

      5cfc2000d96e96a249f212e9b03c7d813906f983f3572879626f9faa684e1687

      SHA512

      b953a17ab8b5640bbbd1900083ac1a897f09d6522bff0952b4d55d5e9e8c1309d57dfe1093bd647630905d645dd2a246ff3444a40cccaa1fbc2ab324f843161d

    • C:\Users\Admin\AppData\Local\Temp\RES319B.tmp

      Filesize

      1KB

      MD5

      b0da2def039b8e3882098d8a8110e11e

      SHA1

      62298f0d678823c4b49b0e134a75210a632c0a74

      SHA256

      93950daa9c6d81c6f699c913167239460383b9415385e56fce8ba34e5f66f86e

      SHA512

      4f9a5cb715909c7a1f12becfcb1ed721177cbac2b085b7064f307b47ebfb37fc3f44a1b42371459de0ebc24ea9356c619255dc69c02b5106fd9eb681638e8088

    • C:\Users\Admin\AppData\Local\Temp\qrqzftgo\qrqzftgo.0.vb

      Filesize

      2KB

      MD5

      21303903aa90e227af6bbdae014152b5

      SHA1

      9dfab9828827d9370b8c65641e9b1b5b77a2e4c1

      SHA256

      9fd46c542828c6dccd0aec7bbccc4601515d7ba61a3974d91cd0570fc30e1d29

      SHA512

      fd8ad92637aaeee6233a023f1bb162455f984cd52d36f97e34eddfcb5ed3ab5abb45c2feceddc91638e63e408b1e88bf4987f4aaa4997f50df3e27d3a841d0a6

    • C:\Users\Admin\AppData\Local\Temp\qrqzftgo\qrqzftgo.cmdline

      Filesize

      273B

      MD5

      24291e44476091e2ee517fffa0a8b1f0

      SHA1

      02d1e0837eac84c3c884fca073e434798532ccad

      SHA256

      a7ee759c7a9ff271810b34517f442c8b1b7ba4fa05e8c7a52f029bddfb33955c

      SHA512

      787865a566cabdbc6b4b7af5eb55eed151357dee0f5196f4339aba47e3119098b5da742177396cc809046164ef27c0c15ab6f95df34f5f7557f06d0567b754b0

    • C:\Users\Admin\AppData\Local\Temp\tmp3045.tmp.exe

      Filesize

      12KB

      MD5

      4ef5896eee09f2424cca1c8c79c2c5b2

      SHA1

      9eb9cc0616ac842e1399406fd52da69f92a75117

      SHA256

      f6f1ad6f709aaa9752af1de52d11a68468a86ceb349b109e44e602942e422f59

      SHA512

      03cf30c386059b6a7f19ad3df94b0ba5a9399e4f7e6dd9ca9848afae417857222873ddbbd82053286d7f1973526becf7f1c7bd209f79c9cf332936916df92e87

    • C:\Users\Admin\AppData\Local\Temp\vbc947CECBAEADC47E193A3C24ABD498D32.TMP

      Filesize

      1KB

      MD5

      1e986ab7615234ca6b8bf79cfc0b6865

      SHA1

      c17c711651c7a954b3de94dbf5ca6f4d1479881c

      SHA256

      82d4571f0530dea11b80abe5b461200006442e1ca42711b3553e787422b5150c

      SHA512

      f83706ddf4dbb67ba188ba27c4f5022205ac86321869359f2eefcaad7e2aac67e52c007112222f2be9dc7c341391ef352c2c8915a223ff8b2c2ab839fd608f83

    • memory/1460-0-0x00000000745DE000-0x00000000745DF000-memory.dmp

      Filesize

      4KB

    • memory/1460-1-0x0000000000810000-0x000000000081A000-memory.dmp

      Filesize

      40KB

    • memory/1460-7-0x00000000745D0000-0x0000000074CBE000-memory.dmp

      Filesize

      6.9MB

    • memory/1460-24-0x00000000745D0000-0x0000000074CBE000-memory.dmp

      Filesize

      6.9MB

    • memory/2624-23-0x00000000010A0000-0x00000000010AA000-memory.dmp

      Filesize

      40KB