Analysis

  • max time kernel
    7s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    21-05-2024 20:51

General

  • Target

    0d19637d68c53f3cac3959a848473a60_NeikiAnalytics.exe

  • Size

    128KB

  • MD5

    0d19637d68c53f3cac3959a848473a60

  • SHA1

    5f8dc94e8c019634c2a1a4b016cdf650dacb7a00

  • SHA256

    9abe33680967b1a3321cf8610f2f93e16a423a5b9e5f587c77ac8819f2236f3b

  • SHA512

    8897a2b619dfd240fa73d551e221027570cc2aedbc743b0be433b8adc0a64caed4f3d02c3a5f084d1e394e0ef3d053269f3f395578cfd822e5e210537b7ac3c8

  • SSDEEP

    3072:VvgwhTm5amkqIJS20hD7Me+QpWT21/Blx77x19:jmhUKWyJBlx77/9

Score
7/10
upx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0d19637d68c53f3cac3959a848473a60_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\0d19637d68c53f3cac3959a848473a60_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1772
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Windows\system32\svchost.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3804
    • C:\Users\Admin\AppData\Local\Temp\0d19637d68c53f3cac3959a848473a60_NeikiAnalytics.exe
      "C:\Users\Admin\AppData\Local\Temp\0d19637d68c53f3cac3959a848473a60_NeikiAnalytics.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3932
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\NKKVS.bat" "
        3⤵
          PID:2580
          • C:\Windows\SysWOW64\reg.exe
            REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Key Name" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\FolderName\datafli.exe" /f
            4⤵
              PID:2776
          • C:\Users\Admin\AppData\Roaming\FolderName\datafli.exe
            "C:\Users\Admin\AppData\Roaming\FolderName\datafli.exe"
            3⤵
              PID:2620
              • C:\Windows\SysWOW64\svchost.exe
                "C:\Windows\system32\svchost.exe"
                4⤵
                  PID:4036
                • C:\Users\Admin\AppData\Roaming\FolderName\datafli.exe
                  "C:\Users\Admin\AppData\Roaming\FolderName\datafli.exe"
                  4⤵
                    PID:4056

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\0d19637d68c53f3cac3959a848473a60_NeikiAnalytics.exe

              Filesize

              128KB

              MD5

              0d19637d68c53f3cac3959a848473a60

              SHA1

              5f8dc94e8c019634c2a1a4b016cdf650dacb7a00

              SHA256

              9abe33680967b1a3321cf8610f2f93e16a423a5b9e5f587c77ac8819f2236f3b

              SHA512

              8897a2b619dfd240fa73d551e221027570cc2aedbc743b0be433b8adc0a64caed4f3d02c3a5f084d1e394e0ef3d053269f3f395578cfd822e5e210537b7ac3c8

            • C:\Users\Admin\AppData\Local\Temp\NKKVS.bat

              Filesize

              148B

              MD5

              cad4294c9f78a2359f70ea09f0f56325

              SHA1

              1d02ee76821a5b6fe45aa4f12bac8f86b0043691

              SHA256

              48eb38071c5a2a5c40b3110fcbcb52f6ad0849c3ec20b1cf1be5fa223ac0aaf4

              SHA512

              cd62dd9423a3224d2c4d27853554e0574212cf48a824d562ab3e17231bb839f1dadb12067a7ca39c0cf8ddd5b0e3e8c1dbf601f9822567957e7c29e51fe1693d

            • \Users\Admin\AppData\Roaming\FolderName\datafli.exe

              Filesize

              128KB

              MD5

              118aab88dcf4b291b968a7ebc8a273cd

              SHA1

              0a101f51062c6924cc265731df9b48e4a7601f4c

              SHA256

              df6976b824797e0613575a4241be026230170cf43e56c8b662d695431d5c7606

              SHA512

              2ceb3c69bffbc0c9e4d8a55bb4435a68b3a64bc696197ff7f893478842dce89f1501524004095f993c8a4776f9ff95b53cadf1b06f1b79967f3f9078846c5a76

            • memory/1772-14-0x0000000000250000-0x0000000000251000-memory.dmp

              Filesize

              4KB

            • memory/1772-20-0x0000000000260000-0x0000000000261000-memory.dmp

              Filesize

              4KB

            • memory/1772-28-0x0000000000280000-0x0000000000281000-memory.dmp

              Filesize

              4KB

            • memory/1772-32-0x0000000000290000-0x0000000000291000-memory.dmp

              Filesize

              4KB

            • memory/1772-4-0x0000000000230000-0x0000000000231000-memory.dmp

              Filesize

              4KB

            • memory/1772-2-0x0000000000230000-0x0000000000231000-memory.dmp

              Filesize

              4KB

            • memory/1772-8-0x0000000000240000-0x0000000000241000-memory.dmp

              Filesize

              4KB

            • memory/3932-668-0x0000000000400000-0x000000000040B000-memory.dmp

              Filesize

              44KB

            • memory/3932-1461-0x0000000000400000-0x000000000040B000-memory.dmp

              Filesize

              44KB

            • memory/4056-1462-0x0000000000400000-0x000000000040B000-memory.dmp

              Filesize

              44KB

            • memory/4056-1471-0x0000000000400000-0x000000000040B000-memory.dmp

              Filesize

              44KB