Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 09:31
Static task
static1
Behavioral task
behavioral1
Sample
8bf16c6e5947a8725b12ad6b51b751f0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8bf16c6e5947a8725b12ad6b51b751f0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
8bf16c6e5947a8725b12ad6b51b751f0_NeikiAnalytics.exe
-
Size
1.1MB
-
MD5
8bf16c6e5947a8725b12ad6b51b751f0
-
SHA1
3415aa2210e831cd3552e9bb7bd0aa35efb87cde
-
SHA256
29b911e4f366d3ce03857b91cf5f3743b7671957a8d0e05b096e18c9925aee9f
-
SHA512
2629c6979dc0c793f203708a9da34aa822f556a9c4a0b4b86566f7732b3b0cad61f321b7aee2261a8ba523f105ab22516b299975e1908a99cffe6faddffb1172
-
SSDEEP
3072:qtwizQTj8CSUYf8W3nSjen++Bj88OZS0/Qe2HdOLlqw1aQS0Tm2TdLz2i1qt2i1k:Ouj8NDF3OR9/Qe2HdklrSqjzQtJo3FCk
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2676 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1744 casino_extensions.exe 2908 LiveMessageCenter.exe -
Loads dropped DLL 4 IoCs
pid Process 856 casino_extensions.exe 856 casino_extensions.exe 3052 casino_extensions.exe 3052 casino_extensions.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\LiveMessageCenter.exe casino_extensions.exe File opened for modification C:\Windows\SysWOW64\LiveMessageCenter.exe casino_extensions.exe File opened for modification C:\Windows\SysWOW64\casino_extensions.exe casino_extensions.exe File opened for modification C:\Windows\SysWOW64\LiveMessageCenter.exe casino_extensions.exe File created C:\Windows\SysWOW64\casino_extensions.exe casino_extensions.exe File opened for modification C:\Windows\SysWOW64\casino_extensions.exe casino_extensions.exe File opened for modification C:\Windows\SysWOW64\casino_extensions.exe casino_extensions.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Internet Explorer\casino_extensions.exe casino_extensions.exe File opened for modification C:\Program Files (x86)\Internet Explorer\casino_extensions.exe LiveMessageCenter.exe File created C:\Program Files (x86)\Internet Explorer\$$202803s.bat casino_extensions.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2908 LiveMessageCenter.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2140 8bf16c6e5947a8725b12ad6b51b751f0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2140 wrote to memory of 856 2140 8bf16c6e5947a8725b12ad6b51b751f0_NeikiAnalytics.exe 28 PID 2140 wrote to memory of 856 2140 8bf16c6e5947a8725b12ad6b51b751f0_NeikiAnalytics.exe 28 PID 2140 wrote to memory of 856 2140 8bf16c6e5947a8725b12ad6b51b751f0_NeikiAnalytics.exe 28 PID 2140 wrote to memory of 856 2140 8bf16c6e5947a8725b12ad6b51b751f0_NeikiAnalytics.exe 28 PID 856 wrote to memory of 1744 856 casino_extensions.exe 29 PID 856 wrote to memory of 1744 856 casino_extensions.exe 29 PID 856 wrote to memory of 1744 856 casino_extensions.exe 29 PID 856 wrote to memory of 1744 856 casino_extensions.exe 29 PID 1744 wrote to memory of 3052 1744 casino_extensions.exe 30 PID 1744 wrote to memory of 3052 1744 casino_extensions.exe 30 PID 1744 wrote to memory of 3052 1744 casino_extensions.exe 30 PID 1744 wrote to memory of 3052 1744 casino_extensions.exe 30 PID 3052 wrote to memory of 2908 3052 casino_extensions.exe 31 PID 3052 wrote to memory of 2908 3052 casino_extensions.exe 31 PID 3052 wrote to memory of 2908 3052 casino_extensions.exe 31 PID 3052 wrote to memory of 2908 3052 casino_extensions.exe 31 PID 2908 wrote to memory of 3040 2908 LiveMessageCenter.exe 32 PID 2908 wrote to memory of 3040 2908 LiveMessageCenter.exe 32 PID 2908 wrote to memory of 3040 2908 LiveMessageCenter.exe 32 PID 2908 wrote to memory of 3040 2908 LiveMessageCenter.exe 32 PID 3040 wrote to memory of 2676 3040 casino_extensions.exe 33 PID 3040 wrote to memory of 2676 3040 casino_extensions.exe 33 PID 3040 wrote to memory of 2676 3040 casino_extensions.exe 33 PID 3040 wrote to memory of 2676 3040 casino_extensions.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\8bf16c6e5947a8725b12ad6b51b751f0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\8bf16c6e5947a8725b12ad6b51b751f0_NeikiAnalytics.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Program Files (x86)\Internet Explorer\casino_extensions.exe"C:\Program Files (x86)\Internet Explorer\casino_extensions.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\SysWOW64\casino_extensions.exeC:\Windows\system32\casino_extensions.exe3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Program Files (x86)\Internet Explorer\casino_extensions.exe"C:\Program Files (x86)\Internet Explorer\casino_extensions.exe"4⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\LiveMessageCenter.exeC:\Windows\system32\LiveMessageCenter.exe /part25⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Program Files (x86)\Internet Explorer\casino_extensions.exe"C:\Program Files (x86)\Internet Explorer\casino_extensions.exe"6⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\cmd.execmd /c $$2028~1.BAT7⤵
- Deletes itself
PID:2676
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81B
MD54777bf695815d870d27ed4a38a8f0840
SHA1565412b5182bca7a221448dba78369c42d1c4a0c
SHA256c08018226d9a45ab277a01ca35f519ff7ea1cb450d080e24b0f590739654241d
SHA51287e792d326c5a9d2d92984ec4c34d2af9d616a4676a7d69df73b09975fd077d96077ae2528b6fc05752110eb4e406c3e9d94d49d0a74eeaba6bc6a48bca8ac1d
-
Filesize
1.1MB
MD597acd8e8b5e95fde625f99827d9169f7
SHA14c11996fd4f314c904baf452af529b5e8c56febb
SHA256d08d17e95b7789942117c10b51dcfa578c902be104c0d07d7b0b36d5092c0ac3
SHA512cf165d00c2a8cfaf158c0ffcd36cbc6969bc6f01601bbe3b9250b7c10f46994214642e084a250f552a0b2cae1e9a167a500ce1f8437b3fa82b2bd34e51b5f926
-
Filesize
1.1MB
MD56ec817aebda1ae4c12203a6693c8dc2f
SHA1b3c41f4f949c2e362cc94b524cd4d3748a175980
SHA25664045d90940796e948aaf21b0ca29b26dd48e613f805a2703396daadf9d00924
SHA5129ab519da89856b9369b13affff8bda32d8ac67b50a86a7945187c537f81feb2ce99334d51069e2abf907d9c62ad8d044c19702ada6e7be4a77b8e0726771d86d