Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
18-05-2024 04:35
Static task
static1
Behavioral task
behavioral1
Sample
8dd40365e845f07a0b429e634a4090c0_NeikiAnalytics.dll
Resource
win7-20240508-en
General
-
Target
8dd40365e845f07a0b429e634a4090c0_NeikiAnalytics.dll
-
Size
896KB
-
MD5
8dd40365e845f07a0b429e634a4090c0
-
SHA1
9687bf0672114bf599cfb01e76cf88aa9c80a8e1
-
SHA256
5afb1c3c0f4be11c4901a5654cace6795baf1cee126a154ebdd1d5729a6ee33e
-
SHA512
0ac6c8b04acf4023b85aebd7018336904c6fbf93d565d60c21a3aee32d56a55b4f693eda3df0643cb2301ef5b08b4a92639a8a1a5831dfc40d6261889051e6de
-
SSDEEP
12288:dGVNJAvuPFUl/faxGVlBLXKCgFfEK7JRLeHlX//ve7:g3JAvRl/fKwKCgFfx4P/va
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1148-5-0x0000000002D90000-0x0000000002D91000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
notepad.exeSystemPropertiesAdvanced.exesigverif.exepid process 2232 notepad.exe 2420 SystemPropertiesAdvanced.exe 760 sigverif.exe -
Loads dropped DLL 7 IoCs
Processes:
notepad.exeSystemPropertiesAdvanced.exesigverif.exepid process 1148 2232 notepad.exe 1148 2420 SystemPropertiesAdvanced.exe 1148 760 sigverif.exe 1148 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Run\Tonqjizj = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Ar1SdHam\\SystemPropertiesAdvanced.exe" -
Processes:
SystemPropertiesAdvanced.exesigverif.exerundll32.exenotepad.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesAdvanced.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sigverif.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA notepad.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1368 rundll32.exe 1368 rundll32.exe 1368 rundll32.exe 1148 1148 1148 1148 1148 1148 1148 1148 1148 1148 1148 1148 1148 1148 1148 1148 1148 1148 1148 1148 1148 1148 1148 1148 1148 1148 1148 1148 1148 1148 1148 1148 1148 1148 1148 1148 1148 1148 1148 1148 1148 1148 1148 1148 1148 1148 1148 1148 1148 1148 1148 1148 1148 1148 1148 1148 1148 1148 1148 1148 1148 -
Suspicious behavior: GetForegroundWindowSpam 5 IoCs
Processes:
rundll32.exenotepad.exeSystemPropertiesAdvanced.exesigverif.exepid process 1368 rundll32.exe 1148 2232 notepad.exe 2420 SystemPropertiesAdvanced.exe 760 sigverif.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1148 wrote to memory of 2496 1148 notepad.exe PID 1148 wrote to memory of 2496 1148 notepad.exe PID 1148 wrote to memory of 2496 1148 notepad.exe PID 1148 wrote to memory of 2232 1148 notepad.exe PID 1148 wrote to memory of 2232 1148 notepad.exe PID 1148 wrote to memory of 2232 1148 notepad.exe PID 1148 wrote to memory of 2964 1148 SystemPropertiesAdvanced.exe PID 1148 wrote to memory of 2964 1148 SystemPropertiesAdvanced.exe PID 1148 wrote to memory of 2964 1148 SystemPropertiesAdvanced.exe PID 1148 wrote to memory of 2420 1148 SystemPropertiesAdvanced.exe PID 1148 wrote to memory of 2420 1148 SystemPropertiesAdvanced.exe PID 1148 wrote to memory of 2420 1148 SystemPropertiesAdvanced.exe PID 1148 wrote to memory of 2404 1148 sigverif.exe PID 1148 wrote to memory of 2404 1148 sigverif.exe PID 1148 wrote to memory of 2404 1148 sigverif.exe PID 1148 wrote to memory of 760 1148 sigverif.exe PID 1148 wrote to memory of 760 1148 sigverif.exe PID 1148 wrote to memory of 760 1148 sigverif.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8dd40365e845f07a0b429e634a4090c0_NeikiAnalytics.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Windows\system32\notepad.exeC:\Windows\system32\notepad.exe1⤵
-
C:\Users\Admin\AppData\Local\SMK7P7\notepad.exeC:\Users\Admin\AppData\Local\SMK7P7\notepad.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Windows\system32\SystemPropertiesAdvanced.exeC:\Windows\system32\SystemPropertiesAdvanced.exe1⤵
-
C:\Users\Admin\AppData\Local\A4i\SystemPropertiesAdvanced.exeC:\Users\Admin\AppData\Local\A4i\SystemPropertiesAdvanced.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Windows\system32\sigverif.exeC:\Windows\system32\sigverif.exe1⤵
-
C:\Users\Admin\AppData\Local\ewn2LpQez\sigverif.exeC:\Users\Admin\AppData\Local\ewn2LpQez\sigverif.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\A4i\SYSDM.CPLFilesize
900KB
MD5164b905b83d258b1e67bc60851a86d48
SHA1d1ccaa86035d8809de29fe1720b9f94e35262a15
SHA256042c4b72e1872522173b7fb7d984396ff1820efe4e0884eee1e1901cf6498c6e
SHA512efc0ac178798b762e8c53ec46451d7953b450e036e43c6547e8ac12425ae79a83c92dc947710ef0b4dc7187dc7cb9e276dae57529635e5eb227290c200ca4bd3
-
C:\Users\Admin\AppData\Local\SMK7P7\VERSION.dllFilesize
900KB
MD50279ac99f2efa827b76c93e224081587
SHA1b8ecaab9d0af12b7d43e0d38677b70600120e143
SHA256e234c34c2bfc12f5339bb4c636eebe5e536f3419640ce696f608dd27ae63a7b9
SHA512cbdccb18f91f52a2a429d597dab1155b3ad2b4012b52fa5d771518ec398459f6b4c7917ab3b5511af09e1475dad4c5106a6d18f3f96f2152214ef1a4308206e5
-
C:\Users\Admin\AppData\Local\SMK7P7\notepad.exeFilesize
189KB
MD5f2c7bb8acc97f92e987a2d4087d021b1
SHA17eb0139d2175739b3ccb0d1110067820be6abd29
SHA256142e1d688ef0568370c37187fd9f2351d7ddeda574f8bfa9b0fa4ef42db85aa2
SHA5122f37a2e503cffbd7c05c7d8a125b55368ce11aad5b62f17aaac7aaf3391a6886fa6a0fd73223e9f30072419bf5762a8af7958e805a52d788ba41f61eb084bfe8
-
C:\Users\Admin\AppData\Local\ewn2LpQez\VERSION.dllFilesize
900KB
MD5476265d9f798d8a911fe9a3b469b5589
SHA12b33cb89f1aa349c20db48c86ba47aa8bc78314a
SHA256e42266e1cc1b5b73041c9de5b4fbc126dca49f4ccf6fb76c801863998fc1aaa2
SHA5126a610de13646435a8430b47ca78bfc3a94d99a80a2d785c4fa4c6b3d96f15a008769bc7886c9a53f781f01d4b647e47a9f2fac312d1e4191b5481d83643aeeab
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Mewsro.lnkFilesize
1KB
MD5b97a033d04bb2f857cd01142d9a9b1ad
SHA1691cfe2516363dba0457028c06df99eb11cd1243
SHA25621b300096635435b90af4d3287282a02889f92ad548f8ae6443540e8749e9cae
SHA512333815f61b0ec42348a55e2d98d2193db0eeaea1a8311bee20812136e406264b848c99efef79b4c727f28b1332dc08d6aba37a11f3d685d3fc6d82fb75bf7f43
-
\Users\Admin\AppData\Local\A4i\SystemPropertiesAdvanced.exeFilesize
80KB
MD525dc1e599591871c074a68708206e734
SHA127a9dffa92d979d39c07d889fada536c062dac77
SHA256a13b2ba5892c11c731869410b1e3dd2f250d70ff9efd513a9f260ab506dd42ef
SHA512f7da9ce4c3e8aea9095fcc977084c042f85df48fca0b58fb136dfd835ce69b5b1e68f3c11eeb14c617ffcec7011ffc7e5d5a948f49dde653a2348b28e10adb72
-
\Users\Admin\AppData\Local\ewn2LpQez\sigverif.exeFilesize
73KB
MD5e8e95ae5534553fc055051cee99a7f55
SHA14e0f668849fd546edd083d5981ed685d02a68df4
SHA2569e107fd99892d08b15c223ac17c49af75a4cbca41b5e939bb91c9dca9f0d0bec
SHA5125d3c32d136a264b6d2cfba4602e4d8f75e55ba0e199e0e81d7a515c34d8b9237db29647c10ab79081173010ff8e2c6a59b652c0a9cfa796433aed2d200f02da6
-
memory/760-107-0x0000000000100000-0x0000000000107000-memory.dmpFilesize
28KB
-
memory/760-108-0x0000000140000000-0x00000001400E1000-memory.dmpFilesize
900KB
-
memory/1148-15-0x0000000140000000-0x00000001400E0000-memory.dmpFilesize
896KB
-
memory/1148-26-0x0000000140000000-0x00000001400E0000-memory.dmpFilesize
896KB
-
memory/1148-29-0x0000000140000000-0x00000001400E0000-memory.dmpFilesize
896KB
-
memory/1148-28-0x0000000140000000-0x00000001400E0000-memory.dmpFilesize
896KB
-
memory/1148-27-0x0000000140000000-0x00000001400E0000-memory.dmpFilesize
896KB
-
memory/1148-25-0x0000000140000000-0x00000001400E0000-memory.dmpFilesize
896KB
-
memory/1148-24-0x0000000140000000-0x00000001400E0000-memory.dmpFilesize
896KB
-
memory/1148-23-0x0000000140000000-0x00000001400E0000-memory.dmpFilesize
896KB
-
memory/1148-22-0x0000000140000000-0x00000001400E0000-memory.dmpFilesize
896KB
-
memory/1148-21-0x0000000140000000-0x00000001400E0000-memory.dmpFilesize
896KB
-
memory/1148-20-0x0000000140000000-0x00000001400E0000-memory.dmpFilesize
896KB
-
memory/1148-19-0x0000000140000000-0x00000001400E0000-memory.dmpFilesize
896KB
-
memory/1148-18-0x0000000140000000-0x00000001400E0000-memory.dmpFilesize
896KB
-
memory/1148-17-0x0000000140000000-0x00000001400E0000-memory.dmpFilesize
896KB
-
memory/1148-16-0x0000000140000000-0x00000001400E0000-memory.dmpFilesize
896KB
-
memory/1148-127-0x0000000077486000-0x0000000077487000-memory.dmpFilesize
4KB
-
memory/1148-14-0x0000000140000000-0x00000001400E0000-memory.dmpFilesize
896KB
-
memory/1148-13-0x0000000140000000-0x00000001400E0000-memory.dmpFilesize
896KB
-
memory/1148-12-0x0000000140000000-0x00000001400E0000-memory.dmpFilesize
896KB
-
memory/1148-37-0x0000000002100000-0x0000000002107000-memory.dmpFilesize
28KB
-
memory/1148-42-0x00000000776F0000-0x00000000776F2000-memory.dmpFilesize
8KB
-
memory/1148-41-0x0000000077591000-0x0000000077592000-memory.dmpFilesize
4KB
-
memory/1148-48-0x0000000140000000-0x00000001400E0000-memory.dmpFilesize
896KB
-
memory/1148-52-0x0000000140000000-0x00000001400E0000-memory.dmpFilesize
896KB
-
memory/1148-54-0x0000000140000000-0x00000001400E0000-memory.dmpFilesize
896KB
-
memory/1148-36-0x0000000140000000-0x00000001400E0000-memory.dmpFilesize
896KB
-
memory/1148-4-0x0000000077486000-0x0000000077487000-memory.dmpFilesize
4KB
-
memory/1148-5-0x0000000002D90000-0x0000000002D91000-memory.dmpFilesize
4KB
-
memory/1148-9-0x0000000140000000-0x00000001400E0000-memory.dmpFilesize
896KB
-
memory/1148-8-0x0000000140000000-0x00000001400E0000-memory.dmpFilesize
896KB
-
memory/1148-10-0x0000000140000000-0x00000001400E0000-memory.dmpFilesize
896KB
-
memory/1148-7-0x0000000140000000-0x00000001400E0000-memory.dmpFilesize
896KB
-
memory/1368-11-0x0000000140000000-0x00000001400E0000-memory.dmpFilesize
896KB
-
memory/1368-0-0x0000000140000000-0x00000001400E0000-memory.dmpFilesize
896KB
-
memory/1368-2-0x0000000000190000-0x0000000000197000-memory.dmpFilesize
28KB
-
memory/2232-71-0x0000000000090000-0x0000000000097000-memory.dmpFilesize
28KB
-
memory/2232-72-0x0000000140000000-0x00000001400E1000-memory.dmpFilesize
900KB
-
memory/2232-66-0x0000000140000000-0x00000001400E1000-memory.dmpFilesize
900KB
-
memory/2420-84-0x0000000000280000-0x0000000000287000-memory.dmpFilesize
28KB
-
memory/2420-90-0x0000000140000000-0x00000001400E1000-memory.dmpFilesize
900KB