Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21/05/2024, 08:05
Behavioral task
behavioral1
Sample
2024052011eb326cf13eaa4bf1eb70bd3f2100d0cryptolocker_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024052011eb326cf13eaa4bf1eb70bd3f2100d0cryptolocker_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
2024052011eb326cf13eaa4bf1eb70bd3f2100d0cryptolocker_NeikiAnalytics.exe
-
Size
39KB
-
MD5
11eb326cf13eaa4bf1eb70bd3f2100d0
-
SHA1
3084383f844db9bb0c00a0bb067d0eee1a949a9d
-
SHA256
452a41c8ee80f90be27f5f055563f6c82daaf1a0352cfb597e2fd081ca7a859e
-
SHA512
c24997eab1bcde290e8a5237c28655434588347afb159ff69ff1f26a09cbc3fed9081a1440ec8f2dcda9679a6698f2de339761ca5dd54d4c8c28abf301e7c43a
-
SSDEEP
768:q7PdFecFS5agQtOOtEvwDpjeMLZdzuqpXsiE8Wq/DpkITYabDO:qDdFJy3QMOtEvwDpjjWMl7TdG
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2788 asih.exe -
Loads dropped DLL 1 IoCs
pid Process 2676 2024052011eb326cf13eaa4bf1eb70bd3f2100d0cryptolocker_NeikiAnalytics.exe -
resource yara_rule behavioral1/memory/2676-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x000b000000014230-11.dat upx behavioral1/memory/2676-12-0x0000000002220000-0x0000000002230000-memory.dmp upx behavioral1/memory/2788-18-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2676-17-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/2788-28-0x0000000000500000-0x0000000000510000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2676 wrote to memory of 2788 2676 2024052011eb326cf13eaa4bf1eb70bd3f2100d0cryptolocker_NeikiAnalytics.exe 28 PID 2676 wrote to memory of 2788 2676 2024052011eb326cf13eaa4bf1eb70bd3f2100d0cryptolocker_NeikiAnalytics.exe 28 PID 2676 wrote to memory of 2788 2676 2024052011eb326cf13eaa4bf1eb70bd3f2100d0cryptolocker_NeikiAnalytics.exe 28 PID 2676 wrote to memory of 2788 2676 2024052011eb326cf13eaa4bf1eb70bd3f2100d0cryptolocker_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024052011eb326cf13eaa4bf1eb70bd3f2100d0cryptolocker_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\2024052011eb326cf13eaa4bf1eb70bd3f2100d0cryptolocker_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\asih.exe"C:\Users\Admin\AppData\Local\Temp\asih.exe"2⤵
- Executes dropped EXE
PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD5bf96ca543c6219bb172e36e8814b6737
SHA138e285818f569d6196b00585449c7e9b01487aff
SHA25650748b4d200e16f324bd922ace3ac38abfb35093a6c4420f826d92977fe9b938
SHA512580df3a0c71a33a0321ac4e659a0c00c6da599561e5ea8955616baf7b5ae3f3d7ea7be0bbf8ea59413caac89677928e3c9dc35a8940a4148a8f41adba384b7c8