Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 21:36

General

  • Target

    41c6927a623a6a5d3f8b365096124480_NeikiAnalytics.exe

  • Size

    2.6MB

  • MD5

    41c6927a623a6a5d3f8b365096124480

  • SHA1

    bcb7d52997d28b917a306e5b83d45c362cf37f2c

  • SHA256

    db2ac1a9475a243d6de8147c8082a86e2a6237870c4c61e00f02d198ed070583

  • SHA512

    ea2aa7e0ae95663baae9d0f91747f8511b91be6b0a6db104d715971d34cac848f08daaec0db0e650b4a266007253d694b1dbd3dbd34378afa22de2d86511b247

  • SSDEEP

    49152:+qe3f6aSzD7+H98AHaCfu6FCHCL+WuTmuKwEI:vSinD7E9vBunHCK5NKXI

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\41c6927a623a6a5d3f8b365096124480_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\41c6927a623a6a5d3f8b365096124480_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2204
    • C:\Users\Admin\AppData\Local\Temp\is-QC02C.tmp\41c6927a623a6a5d3f8b365096124480_NeikiAnalytics.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-QC02C.tmp\41c6927a623a6a5d3f8b365096124480_NeikiAnalytics.tmp" /SL5="$30142,1785071,899584,C:\Users\Admin\AppData\Local\Temp\41c6927a623a6a5d3f8b365096124480_NeikiAnalytics.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system certificate store
      • Suspicious use of SetWindowsHookEx
      PID:2224

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    fda5c30fcfc34f4c9808c0dd5e1f0910

    SHA1

    87a38b57bfdc9bae7bf5a3a633d958da9761a4f7

    SHA256

    f214ba04dccbcb216dfeba2e90c24f49cb408a40068a535fa110336f26c4102a

    SHA512

    88940b9a7fa629d62cdec1bcc8037b50b1e8f339ac6f40f6f336e606829239f40e38ff2dc129782b69e84be1b31a4762db71d3be6b2cad4ed2b9195d92af7bd6

  • C:\Users\Admin\AppData\Local\Temp\Cab3842.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar3854.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Users\Admin\AppData\Local\Temp\is-8LVRE.tmp\loader.gif

    Filesize

    3KB

    MD5

    d35d95fc6bd8be33d3ce5da2630b90bd

    SHA1

    be2fb4098a151f6c77a85ce8c274a3054a61178b

    SHA256

    dfa608be394c8f6d19aff352185917720f04072ac0412a8cab1174fec4939c08

    SHA512

    078fa3cf9c08c8bdaa554a52b153a159f537de3ee0ba923d64928cdd99b4f2528b4eb229c1b2352b946ef417efd478b453588a6cda1afc91b374e709afc730e4

  • \Users\Admin\AppData\Local\Temp\is-8LVRE.tmp\botva2.dll

    Filesize

    37KB

    MD5

    67965a5957a61867d661f05ae1f4773e

    SHA1

    f14c0a4f154dc685bb7c65b2d804a02a0fb2360d

    SHA256

    450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105

    SHA512

    c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b

  • \Users\Admin\AppData\Local\Temp\is-8LVRE.tmp\zbShieldUtils.dll

    Filesize

    2.0MB

    MD5

    e1f18a22199c6f6aa5d87b24e5b39ef1

    SHA1

    0dcd8f90b575f6f1d10d6789fe769fa26daafd0e

    SHA256

    62c56c8cf2ac6521ce047b73aa99b6d3952ca53f11d34b00e98d17674a2fc10d

    SHA512

    5a10a2f096adce6e7db3a40bc3ea3fd44d602966e606706ee5a780703f211de7f77656c79c296390baee1e008dc3ce327eaaf5d78bbae20108670c5bc809a190

  • \Users\Admin\AppData\Local\Temp\is-QC02C.tmp\41c6927a623a6a5d3f8b365096124480_NeikiAnalytics.tmp

    Filesize

    3.0MB

    MD5

    eaf2c9683c1424abb77a6104b339fda5

    SHA1

    82fe536dc66036a759f620003f324bc726192da0

    SHA256

    a2c20488f11814b0bb8eb471f364c58d8f16a34fb526b84ccb97d15b98450d9a

    SHA512

    49d9482bb2f41aa87654d22f3ffc31abed183ac68545cef87125de932cf745f8c68a31d17e142c4a4f0f21e2bf1edab8cda59ba2b1b1827f8c84837352196bf1

  • memory/2204-2-0x0000000000401000-0x00000000004B7000-memory.dmp

    Filesize

    728KB

  • memory/2204-0-0x0000000000400000-0x00000000004E9000-memory.dmp

    Filesize

    932KB

  • memory/2204-131-0x0000000000400000-0x00000000004E9000-memory.dmp

    Filesize

    932KB

  • memory/2204-143-0x0000000000400000-0x00000000004E9000-memory.dmp

    Filesize

    932KB

  • memory/2224-8-0x0000000000400000-0x000000000070B000-memory.dmp

    Filesize

    3.0MB

  • memory/2224-135-0x0000000007970000-0x000000000797F000-memory.dmp

    Filesize

    60KB

  • memory/2224-141-0x0000000000400000-0x000000000070B000-memory.dmp

    Filesize

    3.0MB

  • memory/2224-132-0x0000000000400000-0x000000000070B000-memory.dmp

    Filesize

    3.0MB