Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    21-05-2024 19:22

General

  • Target

    05bc4e0304281e124cb86a8cb84c2f60_NeikiAnalytics.exe

  • Size

    256KB

  • MD5

    05bc4e0304281e124cb86a8cb84c2f60

  • SHA1

    ebb7b83aecaecda8ab76e3ff15d945296d05bafc

  • SHA256

    82780b1399c878af402606f64eec2d2c5607c5fa667f0e22431adc986a4f49f7

  • SHA512

    0307c0894448cc750626361c200c6f37ac29b6fd567dae5656369749b7bfc0f988351cadb06ddc9de2524bef9db081f0ea0c754155bdf506bfb281025d87c030

  • SSDEEP

    6144:5eIk0YujFHsS3jwc25qXIXakFzrAcJFWyQ5dwwN:AXxujdec24YX7JM2MjDN

Score
8/10

Malware Config

Signatures

  • Modifies AppInit DLL entries 2 TTPs
  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\05bc4e0304281e124cb86a8cb84c2f60_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\05bc4e0304281e124cb86a8cb84c2f60_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of UnmapMainImage
    PID:2276
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {79BD10C0-CE10-4FAA-8922-A97D4A2FFFD1} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2904
    • C:\PROGRA~3\Mozilla\dbilzqh.exe
      C:\PROGRA~3\Mozilla\dbilzqh.exe -kwinamg
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of UnmapMainImage
      PID:2952

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~3\Mozilla\dbilzqh.exe

    Filesize

    256KB

    MD5

    aabe91be06de65ca5bc734db26c01dea

    SHA1

    33ec1e7e32c34acabafe7a72efefd764dabf2737

    SHA256

    3b86cca869ae32dae0fcd6f76df077ff10a645def7890a28e032eaf607c7a1f6

    SHA512

    c7af646ab23ebf62a05231ded245c85c0db6511ee8bce78c91002d40870477729a48a118bdd5938a979a7cb34238d12b00112482cd1ea401a8210a9a91ee59f8

  • memory/2276-0-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/2276-2-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/2276-1-0x0000000000260000-0x00000000002BB000-memory.dmp

    Filesize

    364KB

  • memory/2276-4-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/2952-7-0x0000000000310000-0x000000000036B000-memory.dmp

    Filesize

    364KB

  • memory/2952-8-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/2952-10-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB