Analysis
-
max time kernel
141s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 13:32
Behavioral task
behavioral1
Sample
340de326207f56a91d4d559f044d0dd0_NeikiAnalytics.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
General
-
Target
340de326207f56a91d4d559f044d0dd0_NeikiAnalytics.exe
-
Size
2.1MB
-
MD5
340de326207f56a91d4d559f044d0dd0
-
SHA1
0a68aba8652ae34eb785a5a439204001e2a7c495
-
SHA256
0d18db6368c13e3d4f20a312648e971bb9f7913b30111f3c0002db7049b23c15
-
SHA512
75ae27ee1c489ec29c60a325ba16c8bf2c07598cbccd958fb8552ead79cfb184102ddf55cdc3559c337ea526aa60d79ec03ec2b15fff4d45e72b069e87d8fb74
-
SSDEEP
49152:ZgtFcjRqQHJWpjH1qqCK0I1tkPlCY5KRPdncw50:+tFcjJWdH1qthgttF5cwy
Malware Config
Extracted
Family
risepro
C2
147.45.47.126:58709
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
340de326207f56a91d4d559f044d0dd0_NeikiAnalytics.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 340de326207f56a91d4d559f044d0dd0_NeikiAnalytics.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
340de326207f56a91d4d559f044d0dd0_NeikiAnalytics.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 340de326207f56a91d4d559f044d0dd0_NeikiAnalytics.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 340de326207f56a91d4d559f044d0dd0_NeikiAnalytics.exe -
Processes:
resource yara_rule behavioral1/memory/2196-0-0x0000000000C00000-0x000000000127B000-memory.dmp themida behavioral1/memory/2196-1-0x0000000000C00000-0x000000000127B000-memory.dmp themida behavioral1/memory/2196-2-0x0000000000C00000-0x000000000127B000-memory.dmp themida behavioral1/memory/2196-3-0x0000000000C00000-0x000000000127B000-memory.dmp themida behavioral1/memory/2196-4-0x0000000000C00000-0x000000000127B000-memory.dmp themida behavioral1/memory/2196-7-0x0000000000C00000-0x000000000127B000-memory.dmp themida behavioral1/memory/2196-8-0x0000000000C00000-0x000000000127B000-memory.dmp themida behavioral1/memory/2196-9-0x0000000000C00000-0x000000000127B000-memory.dmp themida behavioral1/memory/2196-6-0x0000000000C00000-0x000000000127B000-memory.dmp themida behavioral1/memory/2196-5-0x0000000000C00000-0x000000000127B000-memory.dmp themida behavioral1/memory/2196-10-0x0000000000C00000-0x000000000127B000-memory.dmp themida -
Processes:
340de326207f56a91d4d559f044d0dd0_NeikiAnalytics.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 340de326207f56a91d4d559f044d0dd0_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\340de326207f56a91d4d559f044d0dd0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\340de326207f56a91d4d559f044d0dd0_NeikiAnalytics.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
PID:2196