Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    21-05-2024 20:54

General

  • Target

    0da92b060d1bc3b164a6fc50f5c735d0_NeikiAnalytics.exe

  • Size

    72KB

  • MD5

    0da92b060d1bc3b164a6fc50f5c735d0

  • SHA1

    268499f46f2d72d7c9a369be9b5b2543ab14a161

  • SHA256

    ee85f93a57f6aa2f080ebc147e4357aca3567bb01c84516a5d170144e9ed569d

  • SHA512

    90df367d48d152caba990a189bb297c99262de5c0441d3262fb0c78b4d0d62e94d5faa7be64b3e7f7e0e4148e7d038c2ac228a2828c55a4de07eb0595328279a

  • SSDEEP

    1536:Ay2wpOqmXZ879wlQd0pBbgUuQF8uHBx7ghY4Mmw0m:N2oIZ879wlQd0pyihFkdwD

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Modifies system certificate store 2 TTPs 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0da92b060d1bc3b164a6fc50f5c735d0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\0da92b060d1bc3b164a6fc50f5c735d0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Drivers directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2392
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c copy /v /y "C:\Users\Admin\AppData\Local\Temp\0da92b060d1bc3b164a6fc50f5c735d0_NeikiAnalytics.exe" "C:\Users\Admin\AppData\Local\Temp\bin.exe"
      2⤵
        PID:1076
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c copy /v /y "C:\Users\Admin\AppData\Local\Temp\0da92b060d1bc3b164a6fc50f5c735d0_NeikiAnalytics.exe" D:\bin.exe
        2⤵
          PID:1700
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c echo [autorun] > D:\autorun.inf
          2⤵
          • Drops autorun.inf file
          PID:2256
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c echo open=bin.exe >> D:\autorun.inf
          2⤵
          • Drops autorun.inf file
          PID:2264
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c copy /v /y "C:\Users\Admin\AppData\Local\Temp\0da92b060d1bc3b164a6fc50f5c735d0_NeikiAnalytics.exe" E:\bin.exe
          2⤵
            PID:2292
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c echo [autorun] > E:\autorun.inf
            2⤵
            • Drops autorun.inf file
            PID:1740
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c echo open=bin.exe >> E:\autorun.inf
            2⤵
            • Drops autorun.inf file
            PID:1732

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          68KB

          MD5

          29f65ba8e88c063813cc50a4ea544e93

          SHA1

          05a7040d5c127e68c25d81cc51271ffb8bef3568

          SHA256

          1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

          SHA512

          e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

          Filesize

          1KB

          MD5

          a266bb7dcc38a562631361bbf61dd11b

          SHA1

          3b1efd3a66ea28b16697394703a72ca340a05bd5

          SHA256

          df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

          SHA512

          0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          fd53f4cc7eb152155953e31d732ab7f3

          SHA1

          2d3a4643471d62b99cc31bae27a40c77618649f3

          SHA256

          d9373c1ab885c00394c92e7d4bf16ab8d4dc787aa5b5f547ea6fc424d88558b0

          SHA512

          2e8e836e6e58cfdabe0f4b3305805e2743d1749d9b656881a2de6640a87dc1fb5ae8fbab94ef077f1ae4502ac8db49c48681fa155047d15fc7f2deff9c4de1a2

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          344B

          MD5

          914fb7e7cb71ac0846c4c33098c6d258

          SHA1

          f0036b8e4a3913062ae9cf6e53db4c2ea14105b7

          SHA256

          6a5dda335b3d519c58eeb97f80b445af20304b28270d9332f5b1eb2179b2692e

          SHA512

          66ec5e31d8edcf47d2b393ca877db52289640d2d2084c35d159d8ff82b4af4587cb96e693621e8ae2936c2d9d54eb8ed17a404d48d1d187857511ef89f6cb69c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

          Filesize

          242B

          MD5

          ec83f4f36c9fe21b9fe1406d48077a27

          SHA1

          68665435ffcf295b70a7ea8879367c5703b48bde

          SHA256

          0f3986fe5bd891eaabd67f7d01bc006f5dd594a0cd56605857940efee9995924

          SHA512

          106f8221b55c4e20b7aefa5b5c9871ddc497305e1dcb4b9a9b3404636d7238463d6f632b010feb0de5755999da6a89bab811ac7f4c783bdafdef9c808fc44ef2

        • C:\Users\Admin\AppData\Local\Temp\Tar1BC0.tmp

          Filesize

          177KB

          MD5

          435a9ac180383f9fa094131b173a2f7b

          SHA1

          76944ea657a9db94f9a4bef38f88c46ed4166983

          SHA256

          67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

          SHA512

          1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

        • C:\Users\Admin\AppData\Local\Temp\bin.exe

          Filesize

          72KB

          MD5

          0da92b060d1bc3b164a6fc50f5c735d0

          SHA1

          268499f46f2d72d7c9a369be9b5b2543ab14a161

          SHA256

          ee85f93a57f6aa2f080ebc147e4357aca3567bb01c84516a5d170144e9ed569d

          SHA512

          90df367d48d152caba990a189bb297c99262de5c0441d3262fb0c78b4d0d62e94d5faa7be64b3e7f7e0e4148e7d038c2ac228a2828c55a4de07eb0595328279a

        • C:\Users\Admin\AppData\Local\Temp\bin.exe

          Filesize

          72KB

          MD5

          003f8cdf8be88af333f927c5ebbe7f60

          SHA1

          7c2c31336f96dbea4aba61881baa486b8a51d143

          SHA256

          b2e78b6685b0d051b8353c9dd064ceb7cae6df6f072d8f0812f806ae6ad3b57b

          SHA512

          dae430fde1ebe687607f5eac631df286a632205c172e1c24e91141cce95e76150a3e65c5b188eb8ff39e42c808e90562b4e173e0dda81a620785f4adac8da6a3