Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    17/05/2024, 02:06

General

  • Target

    848970c9540af8b3c793df4aaee60810_NeikiAnalytics.exe

  • Size

    53KB

  • MD5

    848970c9540af8b3c793df4aaee60810

  • SHA1

    8ae956b9cb57750f4f0cbdfe3d75da630b1365d7

  • SHA256

    ace545f3dcaed239679c711b3755a588260c55a89b8971790841ef53b7138bf2

  • SHA512

    dbe4068faf52f60b7ead838c088a1b60a5b0f37f3d55d2c3d0c82abf87de532df5701048e5337b6770e746b1e2cf417ec917bb18cf2690134b01010c330abf03

  • SSDEEP

    1536:vNeg8r8QmFY7Nb7Kp3StjEMjmLM3ztDJWZsXy4JzxPMU:LFY7NbJJjmLM3zRJWZsXy4Jd

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\848970c9540af8b3c793df4aaee60810_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\848970c9540af8b3c793df4aaee60810_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1936
    • C:\Users\Admin\xiobi.exe
      "C:\Users\Admin\xiobi.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\xiobi.exe

    Filesize

    53KB

    MD5

    b101182103a03899a4d6a908745e5864

    SHA1

    0e7fc6664a122f50bf7ff7ea88015fca26dd81dc

    SHA256

    9fa91e829546ae151b7291e4622a72225330d72b9a50f8d58bd45b683c85aa5a

    SHA512

    142bcfbbaa7bb61a72d4520e1396481352587b15007771790fa1d606a1bd58462b98e2961f2f9dc9f0ae49caedf509d4911f347e8763315653d3e5c3c39bf275

  • memory/1936-0-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/1936-14-0x00000000035D0000-0x00000000035E2000-memory.dmp

    Filesize

    72KB

  • memory/1936-13-0x00000000035D0000-0x00000000035E2000-memory.dmp

    Filesize

    72KB

  • memory/3064-16-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB