Analysis

  • max time kernel
    140s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    20-05-2024 11:21

General

  • Target

    f32b4873dcd3002586548a9c1ed54910_NeikiAnalytics.exe

  • Size

    995KB

  • MD5

    f32b4873dcd3002586548a9c1ed54910

  • SHA1

    b281f8ba00faf3cb72a2aaf3230721164f115df4

  • SHA256

    27b92ce92445bba46c554eb898f263e4737ace3465badc6e380fe8a9cfcfcea2

  • SHA512

    f196e5556ee54ba8f7ee3d73096f9a87d0a01e9607c9141d5856f2ac3573dd9dfc74e1ae2e7751af6bc0ab0ecbf8c96c95b353a572e63884b161c8d17eaaf8a0

  • SSDEEP

    12288:Wh3ZukLF5fRY5a/6GX4D1DwhHd1zre/9CL7ztjfiVuNcmb60phKwBm3Nz7Ms:WhMkxlRSaiPDi3qs3J4uNcmb607P4zws

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f32b4873dcd3002586548a9c1ed54910_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\f32b4873dcd3002586548a9c1ed54910_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2968
    • C:\Users\Admin\AppData\Local\Temp\f32b4873dcd3002586548a9c1ed54910_neikianalytics.exe
      "C:\Users\Admin\AppData\Local\Temp\f32b4873dcd3002586548a9c1ed54910_neikianalytics.exe" C:\Users\Admin\AppData\Local\Temp\f32b4873dcd3002586548a9c1ed54910_NeikiAnalytics.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1560
    • C:\Program Files (x86)\Adobe\acrotray.exe
      "C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\f32b4873dcd3002586548a9c1ed54910_NeikiAnalytics.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1472
      • C:\Program Files (x86)\Adobe\acrotray.exe
        "C:\Program Files (x86)\Adobe\acrotray.exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\f32b4873dcd3002586548a9c1ed54910_NeikiAnalytics.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2332
      • C:\Program Files (x86)\Adobe\acrotray .exe
        "C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\f32b4873dcd3002586548a9c1ed54910_NeikiAnalytics.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2604
        • C:\Program Files (x86)\Adobe\acrotray .exe
          "C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\f32b4873dcd3002586548a9c1ed54910_NeikiAnalytics.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1720
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2680
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2680 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2452
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2680 CREDAT:865285 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Adobe\acrotray .exe

    Filesize

    1009KB

    MD5

    7a092adc42b0a4b1c253ead0761a42ce

    SHA1

    f08a696b4243e0ff165c878b64f5e8339b6b66af

    SHA256

    aca7de7ecb30bf4b3d3f9869d386e696ed8d71877526ddbfaaf2cf4069e14129

    SHA512

    6d6246ece0861a18cc30fb477182487e3aa4dffe0acf5f1d5ee7655e799669985259c239a65b2d6c04e55750efefe8ae6ce86bebe2479edc200eb564475360db

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    456ca934f1567065560cdae7ef38fe1f

    SHA1

    41626e870e0b2bc03c6203546959fabdf47d25ee

    SHA256

    180fea9df14a7815f22ad44546ad8bc74ea618d88cb987d8fb3811d18b3586ba

    SHA512

    025b5d0ec716537d1b4d63726fac6a6050156b72730f63b9dea710dc48ff5698e8dad706915e8978e63c81cf253d2fbb23503047b558a23ca5ae1cf9b13342ba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c9b39c5373684e66067f2c8061ab11af

    SHA1

    927c41a0dafa16b59f09b3b81467c60566696a45

    SHA256

    1f30d9590caa448b59e12141ba0da59eba496345db824ff09abd492c524f4bd7

    SHA512

    c189e709d8b22dcd75117341e3bf8c271a2dd0ccb993466be9eb635bc212477e4904a0755afe7ed29b37e904d703f06fcc09ba63da64fbd753dccb7d57dbce57

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8f629f7b7abc1c0a14ceecce81a692fa

    SHA1

    96e082f225ba4f550ba4a1bc4da1fd864819237f

    SHA256

    3b72ce9e456faa6d065037d8a3744f78b3f2db08bebb69e706d74b7e3b5c6c42

    SHA512

    e032dfb392c7e8b403aa80b3efeaba8090cfd698403a4558b142b4b9e04b70809799c59582a18a9121e33c5859702774a9d6c397ae2329a0a138d4d41ee5670e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a2c168843b398ce49ab971fe31d141fd

    SHA1

    94296a4f8aa7fcb5d96f87affbd3fdc76111f191

    SHA256

    e1071661baa6aaa27a1ddf40b8b9dcea7c85b115a9e172802a5e8e2e9a334200

    SHA512

    0d041f8434d53f46d56a5283ed63097da2b2cf46570eae2a20c13a97f1982210155f936d9546308bcf05717fab700c29fe2393698cb2bc572916fa86b204f524

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fe8d2576a3a9d0782de155e5bfb628c5

    SHA1

    7cd514c3881df31f9877e69661fc17380fc51825

    SHA256

    6c0217b9c5de5fc142e208d81925c9af985608c7ab17dbba506c5fdc0ebd7e96

    SHA512

    37f023267427698bc8cddb3be46060351bee5555b1b00425362700583529869b1fcd84c7e37fb51006c38b99fb1949e92402cc6e67d8c4a5f5851129d8038da6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ca08893783a4b40f8f6de44cd20193b9

    SHA1

    b47b0b063074b094169f826696d991f7577f30a6

    SHA256

    dc7e1eed8eedde16cb12b3792f353652a7a10cccd46151f6a0080ac4a135faf1

    SHA512

    e776a2fffb0843f65d5dc06028460028ef8b42e325c78c3187c2ff49a7e88e334abaa1a014bcad9a75b221747d9e452eaf6dffb588a831f0fec39653e4919911

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    344b4c7ce605e11bfbd85ba6f60c8faa

    SHA1

    7e639b3fb838f6ea086de485f8ebc68847613857

    SHA256

    3585c550706aa202d17ea2a1a0f86edd648a8040a974eafbd23c9e5187aafd16

    SHA512

    cb62d9a0e9afad0cd62f38a60d6fb3f432c3d0e454538db0ae375aacc4c2cb2b3a6a0de7aed9610fa14b3df35985c34eb85cd3464626ce1486575096210430e9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ebfef1ba14e0d7580ef8006a8998f48c

    SHA1

    18894ad220f30da49fc27ff979b676141892f84c

    SHA256

    289753bcc0b3e59989988e4a814eab2842f7d30101feeeceba075cb13f78ebe4

    SHA512

    0c403d608ef4c371f1a001ed636196118e3b697dda0c07f18490ac71e4f4862bbb3f80be382ca04d921f4d835b3604f06b217585fef7818884cc8d2db2cbe14d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b81b5ef77be493b3f0cb48ab8bb71c9b

    SHA1

    5f9a5b5a5b468a011ca1237d573fd27ddebddef7

    SHA256

    3cbf40c4870e2bbc5fccd9b18bdcfaff4bd86b305642fb5b26e061dd4e2e3637

    SHA512

    2772364ba45e77bdf5b134e77a99be42327a923da1919f916087a65a39f87878cf5c528c043da3d713c387bc10d13d18645a74665288fa3b7bc5d8fd50266271

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2dc2df1df93d8459b24b39dcfd37e9db

    SHA1

    480391783e2dafe844986ce3451ddc7278fa39a0

    SHA256

    71e7f3cb19fe27f4cf6e7d1e9339ef22dd8f94f22f228b6cf2669833727d6c5a

    SHA512

    205791308ba933e99a04022122219b2837eb5add4885df772b5b50d29a7c46709244c57ef6b4b117a731826f0b30161d9ef157f1a145929549bd4a3d98acbad4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9d244f4a092de4e38824ecc1f818325f

    SHA1

    4e63d09f97fcc1d2927863e9cc7247287d1ad42a

    SHA256

    9d4970bd4ce2adec022ef51b4c5ed9765ea5c8c0f58c88e371ebc0de278ddf0a

    SHA512

    29be47920631f3588cf6b5d88ddd3fe3c1b2ef7ffe74a49b7222274ae4da201dcdf773f478fc602474045745c32b357d1f3f3af6841f7d74fa3d75c958dc8ab1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d09c488beaae0ca1c66db6d74f8af476

    SHA1

    6f5ee31613743864087a2c49c6ae262a2c8b9ef5

    SHA256

    0d61a2e4cecc6d7ee8911e918ad17982c725e283d2f4182cff5dd4f0ae16f107

    SHA512

    b3f1e6b3c4dc7ac353f0d45e9a8b7f00a9b9379b673597f8d43f73b933f6008b00c85eb01b0f332a43073500824eb5cdcb1c751a2600f95dceee4ed49dd4684b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bb521f10bd1dcce36489252d2439d330

    SHA1

    45f12c2b4497bda4fa1210906d9f4e79418a16be

    SHA256

    6ceeae94197f49730287bfb6b9f69f34c5d8695f8747a56049c703637396e0e3

    SHA512

    dbd2488ec7aa057c1b68aae3b5e5113409eeefd497c0741ab3ea6a7897c25f9ab3580b421eef2dc4b753d304c4f8cf4569933e009f0871b0897a4c5246ada8bd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b3e451c427c6ef984d21c1cc6a7623e6

    SHA1

    499741cad545cbdd7eb6a91c2de1ced26d466486

    SHA256

    a307e8526367ff817d48951e7be1657c71139ddcbfe6ee88e969631f51f2d87b

    SHA512

    dcf67ab638c64409809a5c2d7650da2f085c756bf6ebc9eb30eca408efd2d922a54a7d319b4d253ea2eb4e5c6fca2bed82a81ace1495f1342991403266b183cd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    dc2712f9e3fd4c125762c6c772628b0f

    SHA1

    e52171f4bfac9e5af4ce32356b011d3e4dc65a63

    SHA256

    c29057e49780a5bfffde5ac7876b119409666766721d3d899922830817b70b8a

    SHA512

    863fc52efac29bbab334f2eeba71809edb215e5f5386028e4eb0f0bf5c012fbc2484fe2a599985f4d5ad4033f9c9b9b27b8d173314fcd7fcd67728fd7aa73bce

  • C:\Users\Admin\AppData\Local\Temp\Cab7072.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar71EF.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • \Program Files (x86)\Adobe\acrotray.exe

    Filesize

    1007KB

    MD5

    0723471a77ab67b62d56cc8a8ea05346

    SHA1

    2d4e9b8642742217ed6a0ff814e95437acd71c8a

    SHA256

    9112b16e3ff4a5cf4dbabde3a8e022ce4b46710b41bc9bc8404ba9d26f8f69d5

    SHA512

    fd336228c7176ae09b934ad8826c8ede5747b9fdbf9a5870bbb514a9a14aff1782f29646418b0d64464b1b7125d5dab54c805e8550a2e012d3520634ef38b136

  • memory/2968-0-0x0000000010000000-0x0000000010010000-memory.dmp

    Filesize

    64KB

  • memory/2968-27-0x0000000003390000-0x0000000003392000-memory.dmp

    Filesize

    8KB