Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    16/05/2024, 12:31

General

  • Target

    dea397043eac41a1bca5e5580c4c61d0_NeikiAnalytics.exe

  • Size

    132KB

  • MD5

    dea397043eac41a1bca5e5580c4c61d0

  • SHA1

    8e0c74b7db3f9222727b2bce80e4280a04ce7cf6

  • SHA256

    e3d334ab5fdeca11243d90e28fbdb926d048f1e3caeb327eb169347bc069dcfc

  • SHA512

    3a20eefc07fe123d37fa9dfbbffbae9cda2f901eab2c037e10d96755b04998fad36901df0e60b8e97d2cbbaa8406295e64fe73c613abe97dda87b90bfa2b196e

  • SSDEEP

    1536:UwWZugYu9+7gWbrimfWSeJFzkRcTwdE1dIumgDL0FfxTGLTej7j:Uw6T8gWi2eJFzkRswZumgDLOfOTenj

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dea397043eac41a1bca5e5580c4c61d0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\dea397043eac41a1bca5e5580c4c61d0_NeikiAnalytics.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1648
    • C:\Users\Admin\fefey.exe
      "C:\Users\Admin\fefey.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2640

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\fefey.exe

    Filesize

    132KB

    MD5

    a4e1c968e5bc775e3f6e3803418a0d74

    SHA1

    cbbc3b2cc267733303ad7f6b6e26cd1de706df62

    SHA256

    03312c77dd3f40a3f7938cddf62c80518ef95206ec0d99c99388d1a7bf80eac5

    SHA512

    137cdbf2b8a8b8572e4278c345ecbdc9fb8e7a1fd8ee2411153116b400ee3bf546b491d80f1f59432faf4a12b94d58966a801b64112ba8d4ff07f8c1d5ce53b5

  • memory/1648-0-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1648-14-0x0000000003220000-0x0000000003248000-memory.dmp

    Filesize

    160KB

  • memory/1648-19-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1648-20-0x0000000003220000-0x0000000003248000-memory.dmp

    Filesize

    160KB

  • memory/1648-21-0x0000000003220000-0x0000000003248000-memory.dmp

    Filesize

    160KB

  • memory/2640-15-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2640-22-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB