Analysis

  • max time kernel
    121s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    21-05-2024 05:39

General

  • Target

    073da24e39d18e4e5f412741ef6808d17fccbced41f246205a78c20e02d1b6b0_NeikiAnalytics.exe

  • Size

    1017KB

  • MD5

    a780fcea8c474f86b8fb83959d448430

  • SHA1

    e311edad79e8620ac23958a4e1f147a9fc380ff1

  • SHA256

    073da24e39d18e4e5f412741ef6808d17fccbced41f246205a78c20e02d1b6b0

  • SHA512

    a817dde1298db12bb414985df311897ffcf3d81b9bff9294c4b1e364bfa4ded5f3f5a65439e76d8356c327ae6b92c31fd8638706b75ca046c001485ba35b33bf

  • SSDEEP

    6144:yuj8NDF3OR9/Qe2HdklrSqjzQtJo3FCyvI:NOF3ORK3d9QzQtJo3FCaI

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\073da24e39d18e4e5f412741ef6808d17fccbced41f246205a78c20e02d1b6b0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\073da24e39d18e4e5f412741ef6808d17fccbced41f246205a78c20e02d1b6b0_NeikiAnalytics.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2336
    • C:\Program Files (x86)\Internet Explorer\casino_extensions.exe
      "C:\Program Files (x86)\Internet Explorer\casino_extensions.exe"
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:1776
      • C:\Windows\SysWOW64\casino_extensions.exe
        C:\Windows\system32\casino_extensions.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:1684
        • C:\Program Files (x86)\Internet Explorer\casino_extensions.exe
          "C:\Program Files (x86)\Internet Explorer\casino_extensions.exe"
          4⤵
          • Loads dropped DLL
          • Drops file in System32 directory
          • Suspicious use of WriteProcessMemory
          PID:2368
          • C:\Windows\SysWOW64\LiveMessageCenter.exe
            C:\Windows\system32\LiveMessageCenter.exe /part2
            5⤵
            • Deletes itself
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Suspicious behavior: EnumeratesProcesses
            PID:1204

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\SysWOW64\LiveMessageCenter.exe

    Filesize

    1.0MB

    MD5

    7572414562c4ab48c64bfdd6d3e73d23

    SHA1

    3c30612ac934d84d4a55b346c2f2c498095d069f

    SHA256

    8845e16933918171a00cfd269b3ea724e74b0afdfa7a4758a24326a911c183fa

    SHA512

    ba67a37801d00aefcf625ea98da2d449ac0d25a6c5289d1bc2b521e46f0fee73402aeb2975e312afb75f1ca1c95ea450cd99054ed70a8e42db3f411dca841409

  • \Windows\SysWOW64\casino_extensions.exe

    Filesize

    1020KB

    MD5

    609f10667a2d2e263964b16fd09c4d85

    SHA1

    78392d3f281113e5c67172d7f400cbce99318efe

    SHA256

    1c739712deb9c8b2960787b444637927f0cd8d56ffcce46572b903c1f44ec83b

    SHA512

    4b0dbd9536d5b792dd91cf847aeefce11193037aa7be7a631855d077a4f153c52f69afe22cde4246a0e51f78d10965da936bf2491fc15486f85aea8cec2fa4d6

  • memory/2336-20-0x0000000000400000-0x0000000000425000-memory.dmp

    Filesize

    148KB