Malware Analysis Report

2025-01-22 12:51

Sample ID 240521-j2g9msea42
Target 2024052065489c337359e4fc7f087522091c7296icedid_NeikiAnalytics
SHA256 05d956a5aa2add3c869e8de4dbc1ca90486f2f3462518f768f0f03ec5332dda4
Tags
upx vmprotect
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

05d956a5aa2add3c869e8de4dbc1ca90486f2f3462518f768f0f03ec5332dda4

Threat Level: Shows suspicious behavior

The file 2024052065489c337359e4fc7f087522091c7296icedid_NeikiAnalytics was found to be: Shows suspicious behavior.

Malicious Activity Summary

upx vmprotect

UPX packed file

VMProtect packed file

Unsigned PE

Suspicious behavior: EnumeratesProcesses

Suspicious use of SetWindowsHookEx

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-05-21 08:09

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-21 08:09

Reported

2024-05-21 08:48

Platform

win7-20231129-en

Max time kernel

118s

Max time network

123s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2024052065489c337359e4fc7f087522091c7296icedid_NeikiAnalytics.exe"

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

VMProtect packed file

vmprotect
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\2024052065489c337359e4fc7f087522091c7296icedid_NeikiAnalytics.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\2024052065489c337359e4fc7f087522091c7296icedid_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\2024052065489c337359e4fc7f087522091c7296icedid_NeikiAnalytics.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 7k7kfz.cn udp
HK 8.218.210.137:80 7k7kfz.cn tcp

Files

memory/1620-1-0x0000000010000000-0x000000001003E000-memory.dmp

memory/1620-0-0x0000000010000000-0x000000001003E000-memory.dmp

memory/1620-2-0x0000000010000000-0x000000001003E000-memory.dmp

memory/1620-9-0x0000000010000000-0x000000001003E000-memory.dmp

memory/1620-32-0x0000000010000000-0x000000001003E000-memory.dmp

memory/1620-4-0x0000000010000000-0x000000001003E000-memory.dmp

memory/1620-46-0x0000000010000000-0x000000001003E000-memory.dmp

memory/1620-51-0x0000000010000000-0x000000001003E000-memory.dmp

memory/1620-50-0x0000000010000000-0x000000001003E000-memory.dmp

memory/1620-49-0x0000000010000000-0x000000001003E000-memory.dmp

memory/1620-44-0x0000000010000000-0x000000001003E000-memory.dmp

memory/1620-52-0x0000000004F70000-0x000000000513D000-memory.dmp

memory/1620-41-0x0000000010000000-0x000000001003E000-memory.dmp

memory/1620-39-0x0000000010000000-0x000000001003E000-memory.dmp

memory/1620-36-0x0000000010000000-0x000000001003E000-memory.dmp

memory/1620-34-0x0000000010000000-0x000000001003E000-memory.dmp

memory/1620-29-0x0000000010000000-0x000000001003E000-memory.dmp

memory/1620-60-0x0000000005650000-0x000000000581D000-memory.dmp

memory/1620-62-0x0000000005650000-0x000000000581D000-memory.dmp

memory/1620-59-0x0000000004F70000-0x000000000513D000-memory.dmp

memory/1620-58-0x0000000004F70000-0x000000000513D000-memory.dmp

memory/1620-54-0x0000000004F70000-0x000000000513D000-memory.dmp

memory/1620-27-0x0000000010000000-0x000000001003E000-memory.dmp

memory/1620-25-0x0000000010000000-0x000000001003E000-memory.dmp

memory/1620-23-0x0000000010000000-0x000000001003E000-memory.dmp

memory/1620-63-0x0000000005650000-0x000000000581D000-memory.dmp

memory/1620-67-0x0000000005650000-0x000000000581D000-memory.dmp

memory/1620-21-0x0000000010000000-0x000000001003E000-memory.dmp

memory/1620-18-0x0000000010000000-0x000000001003E000-memory.dmp

memory/1620-16-0x0000000010000000-0x000000001003E000-memory.dmp

memory/1620-13-0x0000000010000000-0x000000001003E000-memory.dmp

memory/1620-111-0x00000000003C0000-0x00000000003FE000-memory.dmp

memory/1620-74-0x00000000003C0000-0x00000000003FE000-memory.dmp

memory/1620-72-0x00000000003C0000-0x00000000003FE000-memory.dmp

memory/1620-70-0x00000000003C0000-0x00000000003FE000-memory.dmp

memory/1620-69-0x00000000003C0000-0x00000000003FE000-memory.dmp

memory/1620-68-0x00000000003C0000-0x00000000003FE000-memory.dmp

memory/1620-11-0x0000000010000000-0x000000001003E000-memory.dmp

memory/1620-7-0x0000000010000000-0x000000001003E000-memory.dmp

memory/1620-114-0x0000000010000000-0x000000001003E000-memory.dmp

memory/1620-115-0x0000000005650000-0x000000000581D000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-21 08:09

Reported

2024-05-21 08:50

Platform

win10v2004-20240226-en

Max time kernel

164s

Max time network

178s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2024052065489c337359e4fc7f087522091c7296icedid_NeikiAnalytics.exe"

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

VMProtect packed file

vmprotect
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Processes

C:\Users\Admin\AppData\Local\Temp\2024052065489c337359e4fc7f087522091c7296icedid_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\2024052065489c337359e4fc7f087522091c7296icedid_NeikiAnalytics.exe"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1044 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 79.190.18.2.in-addr.arpa udp
US 13.107.246.64:443 tcp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 7k7kfz.cn udp
HK 8.218.210.137:80 7k7kfz.cn tcp
US 8.8.8.8:53 137.210.218.8.in-addr.arpa udp
US 8.8.8.8:53 64.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 77.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 2.17.178.52.in-addr.arpa udp

Files

memory/3112-0-0x0000000010000000-0x000000001003E000-memory.dmp

memory/3112-1-0x0000000010000000-0x000000001003E000-memory.dmp

memory/3112-25-0x0000000010000000-0x000000001003E000-memory.dmp

memory/3112-33-0x0000000010000000-0x000000001003E000-memory.dmp

memory/3112-36-0x0000000010000000-0x000000001003E000-memory.dmp

memory/3112-45-0x0000000010000000-0x000000001003E000-memory.dmp

memory/3112-42-0x0000000010000000-0x000000001003E000-memory.dmp

memory/3112-40-0x0000000010000000-0x000000001003E000-memory.dmp

memory/3112-38-0x0000000010000000-0x000000001003E000-memory.dmp

memory/3112-31-0x0000000010000000-0x000000001003E000-memory.dmp

memory/3112-29-0x0000000010000000-0x000000001003E000-memory.dmp

memory/3112-27-0x0000000010000000-0x000000001003E000-memory.dmp

memory/3112-23-0x0000000010000000-0x000000001003E000-memory.dmp

memory/3112-21-0x0000000010000000-0x000000001003E000-memory.dmp

memory/3112-19-0x0000000010000000-0x000000001003E000-memory.dmp

memory/3112-17-0x0000000010000000-0x000000001003E000-memory.dmp

memory/3112-15-0x0000000010000000-0x000000001003E000-memory.dmp

memory/3112-13-0x0000000010000000-0x000000001003E000-memory.dmp

memory/3112-11-0x0000000010000000-0x000000001003E000-memory.dmp

memory/3112-7-0x0000000010000000-0x000000001003E000-memory.dmp

memory/3112-5-0x0000000010000000-0x000000001003E000-memory.dmp

memory/3112-3-0x0000000010000000-0x000000001003E000-memory.dmp

memory/3112-9-0x0000000010000000-0x000000001003E000-memory.dmp

memory/3112-46-0x00000000053F0000-0x00000000055BD000-memory.dmp

memory/3112-2-0x0000000010000000-0x000000001003E000-memory.dmp

memory/3112-48-0x00000000053F0000-0x00000000055BD000-memory.dmp

memory/3112-50-0x00000000053F0000-0x00000000055BD000-memory.dmp

memory/3112-53-0x00000000053F0000-0x00000000055BD000-memory.dmp

memory/3112-54-0x0000000005700000-0x00000000058CD000-memory.dmp

memory/3112-56-0x0000000005700000-0x00000000058CD000-memory.dmp

memory/3112-57-0x0000000005700000-0x00000000058CD000-memory.dmp

memory/3112-62-0x0000000005230000-0x000000000526E000-memory.dmp

memory/3112-64-0x0000000005230000-0x000000000526E000-memory.dmp

memory/3112-67-0x0000000005230000-0x000000000526E000-memory.dmp

memory/3112-106-0x0000000005230000-0x000000000526E000-memory.dmp

memory/3112-69-0x0000000005230000-0x000000000526E000-memory.dmp

memory/3112-65-0x0000000005230000-0x000000000526E000-memory.dmp

memory/3112-61-0x0000000005700000-0x00000000058CD000-memory.dmp

memory/3112-63-0x0000000005230000-0x000000000526E000-memory.dmp

memory/3112-109-0x0000000010000000-0x000000001003E000-memory.dmp

memory/3112-110-0x0000000005700000-0x00000000058CD000-memory.dmp