Analysis

  • max time kernel
    141s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    20/05/2024, 06:03

General

  • Target

    c030c74de597b6dfede53096ac87c230_NeikiAnalytics.exe

  • Size

    3.2MB

  • MD5

    c030c74de597b6dfede53096ac87c230

  • SHA1

    019f9e0bbc259f278f6488fb1eacd52bc5cd7aa6

  • SHA256

    d6e601d8270acde2b7df579cdd56f2009eec8e4fd7cf9f24d07556fae8be6192

  • SHA512

    b8e502641dfc445c721745c19d04d221f0fb79736ef16f9a50caff34d17b8155385bd4bc02541a27bd15382acb9706f2e826685c226bbbb6bcbc6453d0423731

  • SSDEEP

    49152:9qe3f6KUhuPiPa98Uc3hwEo0WDiTjebloF7Lp0igNNpCNcQqn224xN9:MSi5uPGaRcRFTjeblo5t0/NecliH

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c030c74de597b6dfede53096ac87c230_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\c030c74de597b6dfede53096ac87c230_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3008
    • C:\Users\Admin\AppData\Local\Temp\is-B7QR3.tmp\c030c74de597b6dfede53096ac87c230_NeikiAnalytics.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-B7QR3.tmp\c030c74de597b6dfede53096ac87c230_NeikiAnalytics.tmp" /SL5="$400F4,2511130,843264,C:\Users\Admin\AppData\Local\Temp\c030c74de597b6dfede53096ac87c230_NeikiAnalytics.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system certificate store
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2172

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\is-07NU1.tmp\bigimage2.png

          Filesize

          198KB

          MD5

          99672fa898aac6ee0b31078bcdd833ba

          SHA1

          1f005d865008b86d26146b1f41da466a1571933d

          SHA256

          052ec497a246df90576bf114c59361a034a573d8f8355d546437b87fc336e1c5

          SHA512

          dc8ec365fec032e671e1f89b16ed25ba9133fbc3bf40a1f5ad952bfedcc664f552bd480d2665a9e03b2c3d87eb9855f34fc2bc764aa9a293dd65a3a6a8f72b9a

        • \Users\Admin\AppData\Local\Temp\is-07NU1.tmp\PTB.dll

          Filesize

          261KB

          MD5

          85c343098c79f5fd5b910031a5ed8e64

          SHA1

          5429b525a6d83c819e7f84cb012724f2f8a9e86e

          SHA256

          53a56b4c1a8ce9452efa9d0f484f0d251326f37d227b7a9b399be655e3e1c5ba

          SHA512

          ac49aadc0333b0955faa13d91c530f1c808b4817485068445505cf1e38ad6bc4598727dce5bd3868fd8b436811b20cd7771722c43ba42ba48a7911017c18db7e

        • \Users\Admin\AppData\Local\Temp\is-07NU1.tmp\WebKitTime.dll

          Filesize

          87KB

          MD5

          08e99159c0194360dd801746d7245107

          SHA1

          559b3c5684ce63d44e00ec7fef76bd136fbde514

          SHA256

          6c43e922c3cdaf1317a69e1573bceadb8bc01b91fe4f0ac49360e71ecd7694ff

          SHA512

          683e2d8b8af36cd58364aafd824d89387d9850face2f36c10dd399e42aad17578cbe9398bbb884e51c5827c257875c7dc0f665cc70584118819f57ec9cd615c7

        • \Users\Admin\AppData\Local\Temp\is-B7QR3.tmp\c030c74de597b6dfede53096ac87c230_NeikiAnalytics.tmp

          Filesize

          3.0MB

          MD5

          3818a7aa6ede394d64fbf596b95ea389

          SHA1

          2961944a5e0216e0c77cfc7efaed103b5e7df973

          SHA256

          b3d0831b5f7392d9dd1978b2fb82f24eaa8f239c9a4b505f8fd01e598f146c81

          SHA512

          fe77bdf78366526d822d0306487cbb7b07209d7e712607ba636d67749b4631ef9f205425ef37c843e810f290dd8bcb72fd21a4480deec80bf9c6bb8a66b7de33

        • memory/2172-8-0x0000000000400000-0x0000000000715000-memory.dmp

          Filesize

          3.1MB

        • memory/2172-12-0x0000000003D30000-0x0000000003D7C000-memory.dmp

          Filesize

          304KB

        • memory/2172-16-0x0000000003EC0000-0x0000000003EDF000-memory.dmp

          Filesize

          124KB

        • memory/2172-45-0x0000000003EC0000-0x0000000003EDF000-memory.dmp

          Filesize

          124KB

        • memory/2172-44-0x0000000003D30000-0x0000000003D7C000-memory.dmp

          Filesize

          304KB

        • memory/2172-43-0x0000000000400000-0x0000000000715000-memory.dmp

          Filesize

          3.1MB

        • memory/3008-2-0x0000000000401000-0x00000000004B7000-memory.dmp

          Filesize

          728KB

        • memory/3008-0-0x0000000000400000-0x00000000004DB000-memory.dmp

          Filesize

          876KB

        • memory/3008-42-0x0000000000400000-0x00000000004DB000-memory.dmp

          Filesize

          876KB