Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21/05/2024, 11:59
Static task
static1
Behavioral task
behavioral1
Sample
4569a24b84e5073b606155a941f936a3f4922b4bfc43417237c1631db978845a_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4569a24b84e5073b606155a941f936a3f4922b4bfc43417237c1631db978845a_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
4569a24b84e5073b606155a941f936a3f4922b4bfc43417237c1631db978845a_NeikiAnalytics.exe
-
Size
715KB
-
MD5
9f097dabc838e75a9c4216ec60b6c460
-
SHA1
7f6cafc761e2a237138a429fcb1648b16fa3df84
-
SHA256
4569a24b84e5073b606155a941f936a3f4922b4bfc43417237c1631db978845a
-
SHA512
814ecd5231908cd8b6588b19b774f03e04b7fabc4f7204c10e9e0d1dbdf4f24a9a4a01480ddc64f86b9cc435531bb2cd6fd657e2a8bff84a9267582b27105aaf
-
SSDEEP
3072:htwizQTj8CSUYf8W3nSjen++Bj88OZS0/Qe2HdOLlqw1aQnj74y0+xkABerFFiWy:buj8NDF3OR9/Qe2Hdklrn4K3eP7y
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2640 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2944 casino_extensions.exe 2876 LiveMessageCenter.exe -
Loads dropped DLL 4 IoCs
pid Process 1952 casino_extensions.exe 1952 casino_extensions.exe 3056 casino_extensions.exe 3056 casino_extensions.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\casino_extensions.exe casino_extensions.exe File opened for modification C:\Windows\SysWOW64\casino_extensions.exe casino_extensions.exe File opened for modification C:\Windows\SysWOW64\casino_extensions.exe casino_extensions.exe File created C:\Windows\SysWOW64\LiveMessageCenter.exe casino_extensions.exe File opened for modification C:\Windows\SysWOW64\LiveMessageCenter.exe casino_extensions.exe File opened for modification C:\Windows\SysWOW64\casino_extensions.exe casino_extensions.exe File opened for modification C:\Windows\SysWOW64\LiveMessageCenter.exe casino_extensions.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Internet Explorer\casino_extensions.exe casino_extensions.exe File opened for modification C:\Program Files (x86)\Internet Explorer\casino_extensions.exe LiveMessageCenter.exe File created C:\Program Files (x86)\Internet Explorer\$$202803s.bat casino_extensions.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2876 LiveMessageCenter.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2924 4569a24b84e5073b606155a941f936a3f4922b4bfc43417237c1631db978845a_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2924 wrote to memory of 1952 2924 4569a24b84e5073b606155a941f936a3f4922b4bfc43417237c1631db978845a_NeikiAnalytics.exe 28 PID 2924 wrote to memory of 1952 2924 4569a24b84e5073b606155a941f936a3f4922b4bfc43417237c1631db978845a_NeikiAnalytics.exe 28 PID 2924 wrote to memory of 1952 2924 4569a24b84e5073b606155a941f936a3f4922b4bfc43417237c1631db978845a_NeikiAnalytics.exe 28 PID 2924 wrote to memory of 1952 2924 4569a24b84e5073b606155a941f936a3f4922b4bfc43417237c1631db978845a_NeikiAnalytics.exe 28 PID 1952 wrote to memory of 2944 1952 casino_extensions.exe 29 PID 1952 wrote to memory of 2944 1952 casino_extensions.exe 29 PID 1952 wrote to memory of 2944 1952 casino_extensions.exe 29 PID 1952 wrote to memory of 2944 1952 casino_extensions.exe 29 PID 2944 wrote to memory of 3056 2944 casino_extensions.exe 30 PID 2944 wrote to memory of 3056 2944 casino_extensions.exe 30 PID 2944 wrote to memory of 3056 2944 casino_extensions.exe 30 PID 2944 wrote to memory of 3056 2944 casino_extensions.exe 30 PID 3056 wrote to memory of 2876 3056 casino_extensions.exe 31 PID 3056 wrote to memory of 2876 3056 casino_extensions.exe 31 PID 3056 wrote to memory of 2876 3056 casino_extensions.exe 31 PID 3056 wrote to memory of 2876 3056 casino_extensions.exe 31 PID 2876 wrote to memory of 2188 2876 LiveMessageCenter.exe 32 PID 2876 wrote to memory of 2188 2876 LiveMessageCenter.exe 32 PID 2876 wrote to memory of 2188 2876 LiveMessageCenter.exe 32 PID 2876 wrote to memory of 2188 2876 LiveMessageCenter.exe 32 PID 2188 wrote to memory of 2640 2188 casino_extensions.exe 33 PID 2188 wrote to memory of 2640 2188 casino_extensions.exe 33 PID 2188 wrote to memory of 2640 2188 casino_extensions.exe 33 PID 2188 wrote to memory of 2640 2188 casino_extensions.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\4569a24b84e5073b606155a941f936a3f4922b4bfc43417237c1631db978845a_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\4569a24b84e5073b606155a941f936a3f4922b4bfc43417237c1631db978845a_NeikiAnalytics.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Program Files (x86)\Internet Explorer\casino_extensions.exe"C:\Program Files (x86)\Internet Explorer\casino_extensions.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\casino_extensions.exeC:\Windows\system32\casino_extensions.exe3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Program Files (x86)\Internet Explorer\casino_extensions.exe"C:\Program Files (x86)\Internet Explorer\casino_extensions.exe"4⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\LiveMessageCenter.exeC:\Windows\system32\LiveMessageCenter.exe /part25⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Program Files (x86)\Internet Explorer\casino_extensions.exe"C:\Program Files (x86)\Internet Explorer\casino_extensions.exe"6⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\cmd.execmd /c $$2028~1.BAT7⤵
- Deletes itself
PID:2640
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81B
MD54777bf695815d870d27ed4a38a8f0840
SHA1565412b5182bca7a221448dba78369c42d1c4a0c
SHA256c08018226d9a45ab277a01ca35f519ff7ea1cb450d080e24b0f590739654241d
SHA51287e792d326c5a9d2d92984ec4c34d2af9d616a4676a7d69df73b09975fd077d96077ae2528b6fc05752110eb4e406c3e9d94d49d0a74eeaba6bc6a48bca8ac1d
-
Filesize
731KB
MD5246550511e601389ce5000d562a957fe
SHA1df1db08ecdaca5a69069742999bf30a9f3753522
SHA25604d4ba453366c43dea687cd3b674c7077e0e92151af0de3e49957e3b5b439b4d
SHA5120ec76820f3e7b80c236bced8fbeeec91d41d800307665aa5ca19d0cbb5407e43acf607c77872a898bee2e80537646cb9752dcba713013de49d4bc3d335daa68a
-
Filesize
724KB
MD536bb56c5b54bd1e09439fbd371d98e52
SHA1db3bfda311344e095a6dc45c9c7db831f5cc3577
SHA256a25e02c80358f15f1414e022ae8b6ea07505fc6983b62238509163e074b110e8
SHA512fd6ff2a8614027b38b756af1e7494d010ecb604c030ac943abc3a365a6101c5dd0e414cbb6bc9fe6fa2b02931442e097178236a4e1eb6a9095c3d55be96a35fb