Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 05:39
Static task
static1
Behavioral task
behavioral1
Sample
073da24e39d18e4e5f412741ef6808d17fccbced41f246205a78c20e02d1b6b0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
073da24e39d18e4e5f412741ef6808d17fccbced41f246205a78c20e02d1b6b0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
073da24e39d18e4e5f412741ef6808d17fccbced41f246205a78c20e02d1b6b0_NeikiAnalytics.exe
-
Size
1017KB
-
MD5
a780fcea8c474f86b8fb83959d448430
-
SHA1
e311edad79e8620ac23958a4e1f147a9fc380ff1
-
SHA256
073da24e39d18e4e5f412741ef6808d17fccbced41f246205a78c20e02d1b6b0
-
SHA512
a817dde1298db12bb414985df311897ffcf3d81b9bff9294c4b1e364bfa4ded5f3f5a65439e76d8356c327ae6b92c31fd8638706b75ca046c001485ba35b33bf
-
SSDEEP
6144:yuj8NDF3OR9/Qe2HdklrSqjzQtJo3FCyvI:NOF3ORK3d9QzQtJo3FCaI
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1204 LiveMessageCenter.exe -
Executes dropped EXE 2 IoCs
pid Process 1684 casino_extensions.exe 1204 LiveMessageCenter.exe -
Loads dropped DLL 4 IoCs
pid Process 1776 casino_extensions.exe 1776 casino_extensions.exe 2368 casino_extensions.exe 2368 casino_extensions.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\casino_extensions.exe casino_extensions.exe File opened for modification C:\Windows\SysWOW64\casino_extensions.exe casino_extensions.exe File opened for modification C:\Windows\SysWOW64\casino_extensions.exe casino_extensions.exe File created C:\Windows\SysWOW64\LiveMessageCenter.exe casino_extensions.exe File opened for modification C:\Windows\SysWOW64\LiveMessageCenter.exe casino_extensions.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Internet Explorer\casino_extensions.exe casino_extensions.exe File opened for modification C:\Program Files (x86)\Internet Explorer\casino_extensions.exe LiveMessageCenter.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1204 LiveMessageCenter.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2336 073da24e39d18e4e5f412741ef6808d17fccbced41f246205a78c20e02d1b6b0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2336 wrote to memory of 1776 2336 073da24e39d18e4e5f412741ef6808d17fccbced41f246205a78c20e02d1b6b0_NeikiAnalytics.exe 30 PID 2336 wrote to memory of 1776 2336 073da24e39d18e4e5f412741ef6808d17fccbced41f246205a78c20e02d1b6b0_NeikiAnalytics.exe 30 PID 2336 wrote to memory of 1776 2336 073da24e39d18e4e5f412741ef6808d17fccbced41f246205a78c20e02d1b6b0_NeikiAnalytics.exe 30 PID 2336 wrote to memory of 1776 2336 073da24e39d18e4e5f412741ef6808d17fccbced41f246205a78c20e02d1b6b0_NeikiAnalytics.exe 30 PID 1776 wrote to memory of 1684 1776 casino_extensions.exe 31 PID 1776 wrote to memory of 1684 1776 casino_extensions.exe 31 PID 1776 wrote to memory of 1684 1776 casino_extensions.exe 31 PID 1776 wrote to memory of 1684 1776 casino_extensions.exe 31 PID 1684 wrote to memory of 2368 1684 casino_extensions.exe 32 PID 1684 wrote to memory of 2368 1684 casino_extensions.exe 32 PID 1684 wrote to memory of 2368 1684 casino_extensions.exe 32 PID 1684 wrote to memory of 2368 1684 casino_extensions.exe 32 PID 2368 wrote to memory of 1204 2368 casino_extensions.exe 33 PID 2368 wrote to memory of 1204 2368 casino_extensions.exe 33 PID 2368 wrote to memory of 1204 2368 casino_extensions.exe 33 PID 2368 wrote to memory of 1204 2368 casino_extensions.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\073da24e39d18e4e5f412741ef6808d17fccbced41f246205a78c20e02d1b6b0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\073da24e39d18e4e5f412741ef6808d17fccbced41f246205a78c20e02d1b6b0_NeikiAnalytics.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Program Files (x86)\Internet Explorer\casino_extensions.exe"C:\Program Files (x86)\Internet Explorer\casino_extensions.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\casino_extensions.exeC:\Windows\system32\casino_extensions.exe3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Program Files (x86)\Internet Explorer\casino_extensions.exe"C:\Program Files (x86)\Internet Explorer\casino_extensions.exe"4⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\LiveMessageCenter.exeC:\Windows\system32\LiveMessageCenter.exe /part25⤵
- Deletes itself
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:1204
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD57572414562c4ab48c64bfdd6d3e73d23
SHA13c30612ac934d84d4a55b346c2f2c498095d069f
SHA2568845e16933918171a00cfd269b3ea724e74b0afdfa7a4758a24326a911c183fa
SHA512ba67a37801d00aefcf625ea98da2d449ac0d25a6c5289d1bc2b521e46f0fee73402aeb2975e312afb75f1ca1c95ea450cd99054ed70a8e42db3f411dca841409
-
Filesize
1020KB
MD5609f10667a2d2e263964b16fd09c4d85
SHA178392d3f281113e5c67172d7f400cbce99318efe
SHA2561c739712deb9c8b2960787b444637927f0cd8d56ffcce46572b903c1f44ec83b
SHA5124b0dbd9536d5b792dd91cf847aeefce11193037aa7be7a631855d077a4f153c52f69afe22cde4246a0e51f78d10965da936bf2491fc15486f85aea8cec2fa4d6