Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 19:22
Static task
static1
Behavioral task
behavioral1
Sample
05bc4e0304281e124cb86a8cb84c2f60_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
05bc4e0304281e124cb86a8cb84c2f60_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
05bc4e0304281e124cb86a8cb84c2f60_NeikiAnalytics.exe
-
Size
256KB
-
MD5
05bc4e0304281e124cb86a8cb84c2f60
-
SHA1
ebb7b83aecaecda8ab76e3ff15d945296d05bafc
-
SHA256
82780b1399c878af402606f64eec2d2c5607c5fa667f0e22431adc986a4f49f7
-
SHA512
0307c0894448cc750626361c200c6f37ac29b6fd567dae5656369749b7bfc0f988351cadb06ddc9de2524bef9db081f0ea0c754155bdf506bfb281025d87c030
-
SSDEEP
6144:5eIk0YujFHsS3jwc25qXIXakFzrAcJFWyQ5dwwN:AXxujdec24YX7JM2MjDN
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
Processes:
dbilzqh.exepid process 2952 dbilzqh.exe -
Drops file in Program Files directory 2 IoCs
Processes:
05bc4e0304281e124cb86a8cb84c2f60_NeikiAnalytics.exedbilzqh.exedescription ioc process File created C:\PROGRA~3\Mozilla\dbilzqh.exe 05bc4e0304281e124cb86a8cb84c2f60_NeikiAnalytics.exe File created C:\PROGRA~3\Mozilla\zxoabnc.dll dbilzqh.exe -
Suspicious use of UnmapMainImage 2 IoCs
Processes:
05bc4e0304281e124cb86a8cb84c2f60_NeikiAnalytics.exedbilzqh.exepid process 2276 05bc4e0304281e124cb86a8cb84c2f60_NeikiAnalytics.exe 2952 dbilzqh.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
taskeng.exedescription pid process target process PID 2904 wrote to memory of 2952 2904 taskeng.exe dbilzqh.exe PID 2904 wrote to memory of 2952 2904 taskeng.exe dbilzqh.exe PID 2904 wrote to memory of 2952 2904 taskeng.exe dbilzqh.exe PID 2904 wrote to memory of 2952 2904 taskeng.exe dbilzqh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\05bc4e0304281e124cb86a8cb84c2f60_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\05bc4e0304281e124cb86a8cb84c2f60_NeikiAnalytics.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2276
-
C:\Windows\system32\taskeng.exetaskeng.exe {79BD10C0-CE10-4FAA-8922-A97D4A2FFFD1} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\PROGRA~3\Mozilla\dbilzqh.exeC:\PROGRA~3\Mozilla\dbilzqh.exe -kwinamg2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2952
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD5aabe91be06de65ca5bc734db26c01dea
SHA133ec1e7e32c34acabafe7a72efefd764dabf2737
SHA2563b86cca869ae32dae0fcd6f76df077ff10a645def7890a28e032eaf607c7a1f6
SHA512c7af646ab23ebf62a05231ded245c85c0db6511ee8bce78c91002d40870477729a48a118bdd5938a979a7cb34238d12b00112482cd1ea401a8210a9a91ee59f8