Analysis
-
max time kernel
1s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
15-05-2024 15:23
Static task
static1
Behavioral task
behavioral1
Sample
d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe
-
Size
112KB
-
MD5
d86aaa8cc228dbba5201329ddd56ad50
-
SHA1
933b1158436d1e68287bafc568935f041c3c147d
-
SHA256
ca9aa9c2d0ebef5f2d182faca7527bf93d96ce53d7a0db09a45d46ed65a58e5e
-
SHA512
b26117bd987b982012a26eb2fbff81549dcb0cf60b973ee965dc5b124b024ebf27e7527b2a08cebe0f807c2960c30cf3d9ace2dafba816d7b7327ca7c40b3fb5
-
SSDEEP
1536:t2ovIa47CqIf2f3w41p7sDcX7juR/JSJw8EeNshUDGXJ:tVIr7zI+fAceoGxSKKo5
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1304-282-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 -
Processes:
resource yara_rule behavioral1/memory/2952-125-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1304-282-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/2952-285-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2748-293-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Suspicious use of SetThreadContext 2 IoCs
Processes:
d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exedescription pid process target process PID 2356 set thread context of 2564 2356 d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe svchost.exe PID 2356 set thread context of 2952 2356 d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
svchost.exepid process 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe 2564 svchost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exesvchost.exed86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exepid process 2356 d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe 2564 svchost.exe 2952 d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exedescription pid process target process PID 2356 wrote to memory of 2564 2356 d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe svchost.exe PID 2356 wrote to memory of 2564 2356 d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe svchost.exe PID 2356 wrote to memory of 2564 2356 d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe svchost.exe PID 2356 wrote to memory of 2564 2356 d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe svchost.exe PID 2356 wrote to memory of 2564 2356 d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe svchost.exe PID 2356 wrote to memory of 2564 2356 d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe svchost.exe PID 2356 wrote to memory of 2564 2356 d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe svchost.exe PID 2356 wrote to memory of 2564 2356 d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe svchost.exe PID 2356 wrote to memory of 2564 2356 d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe svchost.exe PID 2356 wrote to memory of 2564 2356 d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe svchost.exe PID 2356 wrote to memory of 2952 2356 d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe PID 2356 wrote to memory of 2952 2356 d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe PID 2356 wrote to memory of 2952 2356 d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe PID 2356 wrote to memory of 2952 2356 d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe PID 2356 wrote to memory of 2952 2356 d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe PID 2356 wrote to memory of 2952 2356 d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe PID 2356 wrote to memory of 2952 2356 d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe PID 2356 wrote to memory of 2952 2356 d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2564
-
-
C:\Users\Admin\AppData\Local\Temp\d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\d86aaa8cc228dbba5201329ddd56ad50_NeikiAnalytics.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:2952 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\OINJK.bat" "3⤵PID:2684
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows WA" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe" /f4⤵PID:2436
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"3⤵PID:2780
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"4⤵PID:1636
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"4⤵PID:2748
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"C:\Users\Admin\AppData\Roaming\Microsoft\WAMain.exe"4⤵PID:1304
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148B
MD53a4614705555abb049c3298e61170b7f
SHA1c8686410756f346d9551256a5b878b04770950ba
SHA256cff0663c8cfadf83b80583a871c313ffc5d950cb503809cb4a482f400c5d846b
SHA51265ce6fec00e6934f21635e7ccd74757f31ed4b0ddb52bd80d3ea9abeba56340128d23151ef7d9f5daacb5d61e4a4cca50dbb3a43132e350522311ee06e829007
-
Filesize
112KB
MD56c6fc8c02e27057efb0546122cd082f9
SHA1792c07a6914fb320389e845ab1bbda5a689c8643
SHA256650ec30d672087fc7594f87b5a37026fb48569c93915b2d4a644dc0f4174eaa6
SHA51276c2819c30d00d0b8206b01f90c81eb64a98e87619ee807750c605b694bd3838d44109b61b495ae3a32bd76e4a7f4b3daae2a7cc3dc4c7271827a07b90211a4f