Analysis

  • max time kernel
    124s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16/05/2024, 23:46

General

  • Target

    5b9bc133fc3a20951546a1eec3ff1170_NeikiAnalytics.exe

  • Size

    1.4MB

  • MD5

    5b9bc133fc3a20951546a1eec3ff1170

  • SHA1

    ce3e6946b8fe2023395b353976e9cc9e9caef715

  • SHA256

    68b3366a7b13e464e55dc1a4e6086496a7e5d8454b696785c8ff17f8c5791080

  • SHA512

    2bd40f12f7e4b80ac6d048373f3d0ce9c2ebcee78ff53093125bf9fb83cd3ade960bf866e1a8180231fd1b2b63c5aa419340e26ac22386fbb5416b542390560b

  • SSDEEP

    12288:OmDslhGuVjykdC/3z9nX0eV1m8Cd2MVkqw0zUpkyxKJzNgKVzBVhywIQ2b0e3Mc8:OmuUJX0O1MqszUp9KthzBWTQ2b0HJrjf

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 10 IoCs
  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5b9bc133fc3a20951546a1eec3ff1170_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\5b9bc133fc3a20951546a1eec3ff1170_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1132
    • \??\c:\users\admin\appdata\local\temp\wmpscfgs.exe
      c:\users\admin\appdata\local\temp\\wmpscfgs.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2064
      • \??\c:\users\admin\appdata\local\temp\wmpscfgs.exe
        c:\users\admin\appdata\local\temp\\wmpscfgs.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3008
      • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
        C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2100
    • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
      C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2528
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2460
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2460 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2512
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2460 CREDAT:799749 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1632

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          2baa390207960f69bca7118f6fe47473

          SHA1

          4998529489909f983da1b2033f4fb629381ea26a

          SHA256

          da446709a9b881203f073723c0792cf37cf3d1694291d66c6cb22d70a2372640

          SHA512

          a0bca66b61e5c561f08c434e37890a5aab1fb0857169e3dbcf3930eb1c0f0aec67c20a70e134080709446e7666148482d7fd744e28d13566d8cf9283bcd13268

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          90fd6a9d8ce60b7c36325dc3edda4324

          SHA1

          1ac5605d159bec0e8662f6da5ee11892f0f498b2

          SHA256

          324637552111778e68b9ccf450493010c1cf6e96fac047090a6d787e0a3cee5b

          SHA512

          609ee8c44cbe85f9aeac4f3f9b6855b8df911c2a74dec8a234ff20fbd5d2f9f4579d9e3d5018d7242a3f8b8cefb6a262ba37d23577aa33dd2990cd08f4a8163f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          554fbc90b8e7c824d54843d8a9cfb91a

          SHA1

          8f051113b55d2c440f04d968a2bc8c2792d3c863

          SHA256

          2083e7ffcc71aef0ddd5617bf34469aa3d82d736e07ade0422ae01bc65f5ca76

          SHA512

          d2fe234c2ce5c5af9ae3933514186430a70838657973279c29c32a6312e8694b18a791cc9dcd6282ed1e1baf900bf7b3e412c024f3ce4cbfd13d94072ad37e39

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          98e6924e5f3d51028f074cfb3e93ca85

          SHA1

          bdd62d4e2639d0b20f13660121d29b9a42e5c7f7

          SHA256

          2b6e2300969a7acd64df850f751f138098ff996e4837981056451b7d230c8a7f

          SHA512

          7ecfda07f9dba2394b4578073d8d55513c524e16f71caf54e6c326d5520e5a473afeaaf4068dbc63b9d743b8a55267bfe1b49cb112fe4dc0118ef5d03a4c73f1

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          0ac6afe0fe3398bbb4382dbb04e5712b

          SHA1

          da6615e9c4fd882f65b8c6bfb44f4c8d7b4eb12b

          SHA256

          5cc4da81024f409d70363801b3d565a403ece583339f4fc7824e213c62ce8f24

          SHA512

          37f091d0e71989cbd2963640fdd93111127b64c173e4ce934e15296cb332c858e432d09c380c60d63569fd324f56f5473f57572a3b2d6472665d2a484a25b921

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          7076f6c978da813c61ef742bb041c713

          SHA1

          6313a66723241728fd5f9ceb6b51bc1d76ee9d99

          SHA256

          58036caa52344f30740ad0cb6164b684289b76aa6ade926776bf3734754ae63b

          SHA512

          4e0b2333d289582f0ef7eed940244e6955885f096c5da80901bb30cd322bc1267395c00c5f1ba8c85be1a36797656d2aa9546167ea1ae2a32d417cb9f96b711b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          6173c34adeacb09fd6c2219295e6138d

          SHA1

          49a2f2eff9dd8fece685f1dc3b3fd7e16322e665

          SHA256

          8a8252e9e3fe617273b62a05f054b382e40d0c2f2d245b6242cb03a7c3af0d08

          SHA512

          fb94cbc8ef0f21d14e40c452bfa8f401870600e4dee85f02586045d94d2a589baa01966cc1c1bd234e76be41ac27860f228ba9ba07ba5fedb0d72b4a968f7d27

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          c6fc97bf2bc0e237095a17675143e9a9

          SHA1

          49a039e7066e147554d1a46dee34c50a051694f7

          SHA256

          5c1235ee965490042dafd5255790762b7140fc2dcb6ab38b62253de33ff722b2

          SHA512

          d172cc982fbfabd7fca6d396d1db9ac0b70e3edc3dbc723d7da63327eb40f51b8bafc30819b2dc5e70c09b1f88334dc3fc930a275175e966e1dd0b81e7cee003

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          862244225dff58e139bf8d6f37819a65

          SHA1

          c2bc3fa652c25cb3fed349950575918aebc60f8e

          SHA256

          2cfae80a1536c12056674742a199819ed3e0023e9f238724a950f1702948f210

          SHA512

          bb9b5e25d75f60a5df7266357eb1b97beb6023a6d9c7ff4ca0cfabe94365ceb78e0f71d2c76ec0c7f66385bb5e5e5440d8f656979257c26a8b4335015a845f9f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          3924ee5bb85343a0048d1f7ad96277a5

          SHA1

          396098c61d516c9e9c74ded8cb6df2a65082a34c

          SHA256

          8da9447d063516f167e5603f41f467a7f03d86ddfc89423ebef9fba51a192951

          SHA512

          febc50522e08cad141fa38acd66503b7cdfb5c3509ea14275cc08f39e4aee2f154b16297d956dfb6a62d72a762eef9772a058fc53bdca0b8bfd9b92cb3d651b3

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          ab9ad7cf47f71cd4d6de672325501ecb

          SHA1

          06e556f73b970fbff817dadd6618ed157d59dbe9

          SHA256

          f2af5cc46dcda7f261b1ec6a13f3e6b276af12e4a381049fb88d78cbe6f06a9a

          SHA512

          a41fb55f4ec9b8e62c5766f47a1f9599a601539ca594f5944259b9cda6abb3fecb74dc8648993a095b5f07798485a46c2700f95bbe7e0adca913b6311822da00

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          f241e95f19d8a86ca0798abe85bcc16c

          SHA1

          21514e9a54c81c92b6ca2145c4ca1f8386f9bc18

          SHA256

          685e91a22bca423f7f58ed013ac03e65377dc322e3b367c80af63fbf6f01b094

          SHA512

          097b570df4f45f721e3662d44c65a4a9f4f050a13574078c96320d4c5937fba6a450a9a860ae56a8b42f6c77ea088fc37112bb9185ceba4cd4f27795d00dfb4b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          ff7ffe949e3e93221ffec72d99561999

          SHA1

          11256ebbebd5832848092a3cce9ba3129cf77aff

          SHA256

          02db1fb76754b0d76d328e7db8a1bbdb8d7c230ff8253f90b14a408bf37afb8a

          SHA512

          02e534169d0fa81babb276ad15011b67fd5df886fe395ad3332456f96592d071ca56a3b38a9256b677e8c4cc00620e107ee25863b50d5b4c037bc0552948981f

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          9ba53619224c82ff1f56fd0141ff27a7

          SHA1

          16d9735c4d235e46eda8ecca173440db55ff512b

          SHA256

          8ce384307bc8a3b905bc0e948a2b8912867800eb8c8c21c85f52a03140bb1824

          SHA512

          060bc464bf392cb16b184150486e1e4732e923e58f388cc53bf13ccbacc112fe5d56e3df1d21979120c63724979b5402e8fb576b80f0ee61ff84fc105100d6fe

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          c52b9ee1c7b640c4b9f4236e801a9be0

          SHA1

          1c7d7e244bcac2aed6c32ad32aabf52aa6afa384

          SHA256

          4eb7d17e6ac7fd7c8775a331c8860c2df340df535d64b2e3fdf4f1aaf0f35513

          SHA512

          3880e0acb91a2ab785ca3051721088f9bca7a6f063bb57e7c7bd1d9e3bebf496f877098be2d3dede7eafec90e5ec31a6496ba52ef19b8719c28705eea2f5ce23

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          7699d6d539d53e772f785f32858df423

          SHA1

          1fcebaf6c7bccae19909582446a8672d9a7fe548

          SHA256

          423d9d5eefc4f3e961a6e3282f74b75f284e38390916729756e583a7c3ebcd5b

          SHA512

          18466f75ee0ef3707c18bbeb8f48630f3038bd305b87e6028e61eb5c6e4e9d99ca386ba59f22c87d2d3ea81ebbb5405f6ef193224a53f3b3f5068d45c484c62e

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          0a4d856236659eb21d3ebdab45426e6c

          SHA1

          01b0ae22b63dd919176821a626f0f4d16fc1618d

          SHA256

          1935fc2a65f17276f9a79b715e6251c72006be0aa687d765220387c0b29f7548

          SHA512

          de62391cc1a431c78b887f40c7c4dc1e07ae4c0bc730d5f851b78cd8b4639353f968efa3b11ba54fca62ac94ea6eb03a2b1ace76b40105cf678e74b2bd0120f8

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          eefe53e9e698911edbaa4dec3454f17d

          SHA1

          817b98e32405c090bf1dc5526e3d8b4fce5b0281

          SHA256

          e5c9af4b9cef9652c874a693b86cd31c6417fa0c05a302610c6140505f00d05f

          SHA512

          229c5369845f0ec9ca9d1c297c09b4fe4f236c8c2fb88f210b2b784adfef0b23d60b95e9955d5ceca5c456d9faf621d0c003bcad4819860e8273a35bc3cd540c

        • C:\Users\Admin\AppData\Local\Temp\Cab8A94.tmp

          Filesize

          65KB

          MD5

          ac05d27423a85adc1622c714f2cb6184

          SHA1

          b0fe2b1abddb97837ea0195be70ab2ff14d43198

          SHA256

          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

          SHA512

          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

        • C:\Users\Admin\AppData\Local\Temp\Cab8F59.tmp

          Filesize

          68KB

          MD5

          29f65ba8e88c063813cc50a4ea544e93

          SHA1

          05a7040d5c127e68c25d81cc51271ffb8bef3568

          SHA256

          1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

          SHA512

          e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

        • C:\Users\Admin\AppData\Local\Temp\Tar8F6E.tmp

          Filesize

          177KB

          MD5

          435a9ac180383f9fa094131b173a2f7b

          SHA1

          76944ea657a9db94f9a4bef38f88c46ed4166983

          SHA256

          67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

          SHA512

          1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

        • C:\Users\Admin\AppData\Local\Temp\~DFC3D6E85E3B15BDEE.TMP

          Filesize

          16KB

          MD5

          65d5baf2d702d9cf8f132e2c3398736e

          SHA1

          278eb27bff212af81a029b187456db55ea34dcd8

          SHA256

          31c4acdde363ab661d01dbe11bf5bb72be551cf07c1c051fa63b68fc82f41a66

          SHA512

          272dc6b8faf9cf68c03237e1f3b3d9a4b63761e76c591c778fc68fbdae7f5c82156e5bd7e9503b1cfcbd0dd0295cdd92ee8ee30ec73324dc9e7acec56aa18cc4

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\0C9N594H.txt

          Filesize

          107B

          MD5

          a02555776208a8664f1fdd062e8341de

          SHA1

          0d06aa968aca1e208a583309fc1b329a5fa49c73

          SHA256

          1f0c41ce7534492ec10e2988b6ec7d487fae3445467b99a8a723ddb749890f41

          SHA512

          9bf678fd254b9b259168c8ae353748f62206a2fd55817e14cf2e958757202882b591ae5793eaacaa01f2c073e6aa695551aeb694898bf490e17910f4b6294c68

        • \??\c:\program files (x86)\microsoft office\office14\bcssync.exe

          Filesize

          1.5MB

          MD5

          aff277dee888528976ddcbfd8f3a52f8

          SHA1

          0651c981690d4f96c961fd7cb6b3e6271e470601

          SHA256

          7573983db7edf16db0414dc34631995594c3b4b2ec93f3588a4fb711f726c99e

          SHA512

          11ad7c2e01ca0b1b4d38c83496674348f1b3042f500ff72211969ddd4d6f72a577fa7cf76a3c64d66d70ad13487496c59b786d44068ac493d0182064562633f3

        • \Program Files (x86)\Internet Explorer\wmpscfgs.exe

          Filesize

          1.4MB

          MD5

          c80649f62bd75df5125d5895ac5b066d

          SHA1

          4628a335a217c7663569e6b219823cfe0b6bce13

          SHA256

          fa9dd7662433a8f6ecccf937946e7413d6012dc0b88b406107905ebd7ecb5d0b

          SHA512

          01e0d305c1b6093488985f2a36e384f2e32d1d69b10bf552075feb48315c9d41c96fb1f4cac54b14078097b34af05a718a163f9097396cd33a21444f6fbbc782

        • \Users\Admin\AppData\Local\Temp\wmpscfgs.exe

          Filesize

          1.4MB

          MD5

          aaff5357717230badab803075069ccb4

          SHA1

          4e48209a4c9bbca7d43ab9bee89219b2967a9f2b

          SHA256

          4b7345d757982c18655ee852d87f52b618e236f2a6c8cc14d60598f38c53d198

          SHA512

          b2de959bc9f822ff9fc6ecad00854f9e6146762393a9f901ee1b5037471fed28284c1ac834112a3eb657e5f2ad5275bf5747dc68c6445326f794d605a6b8fdab

        • memory/1132-1-0x0000000010000000-0x0000000010010000-memory.dmp

          Filesize

          64KB

        • memory/2064-22-0x0000000010000000-0x0000000010010000-memory.dmp

          Filesize

          64KB

        • memory/2064-50-0x0000000000820000-0x0000000000822000-memory.dmp

          Filesize

          8KB

        • memory/2528-35-0x00000000007A0000-0x00000000007A2000-memory.dmp

          Filesize

          8KB