Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 21:07

General

  • Target

    3bec11f756e246028d9aac53abce7e60_NeikiAnalytics.exe

  • Size

    125KB

  • MD5

    3bec11f756e246028d9aac53abce7e60

  • SHA1

    39d8840f8e7a38357c67f144fca6fb84f0777baa

  • SHA256

    2b02af473f43339867eedfa48540bcb7b6511e6f9d73dc794d49580f9c2a23c3

  • SHA512

    4b1d05c0e4b806deaec9e4fd93e67338fcef1f844a808e6c411ee8ef0db9c54224f91cf6cb0a27408e7df52b6546b8d9a0931a97b82caf2078c7a1e00bf35bf3

  • SSDEEP

    3072:LEboFVlGAvwsgbpvYfMTc72L10fPsout:YBzsgbpvnTcyOPsoS

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • UPX packed file 31 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 25 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3bec11f756e246028d9aac53abce7e60_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\3bec11f756e246028d9aac53abce7e60_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of SetThreadContext
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\System32\svchost.exe -EMBEDDING 423B5D51736E6673606C2147686D64725D426E6C6C6E6F2147686D64725D4C6862736E726E6775215269607364655D4C52486F676E5D304530304530445D474A422F565840 0
      2⤵
      • Deletes itself
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      PID:2488
  • C:\Windows\system32\cmd.exe
    cmd.exe /c call "C:\Program Files\Common Files\Microsoft\1D11D1E\KVEIF.jpg" -3 423B5D51736E6673606C2147686D64725D426E6C6C6E6F2147686D64725D4C6862736E726E6775215269607364655D4C52486F676E5D304530304530445D474A422F565840
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1768
    • C:\Program Files\Common Files\Microsoft\1D11D1E\KVEIF.jpg
      "C:\Program Files\Common Files\Microsoft\1D11D1E\KVEIF.jpg" -3 423B5D51736E6673606C2147686D64725D426E6C6C6E6F2147686D64725D4C6862736E726E6775215269607364655D4C52486F676E5D304530304530445D474A422F565840
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1112
  • C:\Windows\system32\cmd.exe
    cmd.exe /c call "C:\Program Files\Common Files\Microsoft\1D11D1E\KVEIF.jpg" -3 423B5D51736E6673606C2147686D64725D426E6C6C6E6F2147686D64725D4C6862736E726E6775215269607364655D4C52486F676E5D304530304530445D474A422F565840
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1452
    • C:\Program Files\Common Files\Microsoft\1D11D1E\KVEIF.jpg
      "C:\Program Files\Common Files\Microsoft\1D11D1E\KVEIF.jpg" -3 423B5D51736E6673606C2147686D64725D426E6C6C6E6F2147686D64725D4C6862736E726E6775215269607364655D4C52486F676E5D304530304530445D474A422F565840
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2260
      • C:\Windows\SysWOW64\svchost.exe
        C:\Windows\System32\svchost.exe -sys 423B5D51736E6673606C2147686D64725D426E6C6C6E6F2147686D64725D4C6862736E726E6775215269607364655D4C52486F676E5D304530304530445D474A422F565840 0
        3⤵
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:324

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\Common Files\Microsoft Shared\MSInfo\1D11D1E\1D11D1E123.IMD

    Filesize

    126KB

    MD5

    d618ea8565210d10f38663e67fdabce8

    SHA1

    089eac4c7ae6ae4ab207d75d4628d0a63f2fcaef

    SHA256

    b5bf1d8c7605a018b10760b852abca64c7aaae60870a008bdbaa6aa7f79b6ba0

    SHA512

    1cdd430ad3dde205520c33321bba499fa458cc869aea68b4a6a789439b7469cc6de035ddb6e9e1e7676372b079d2a2106114bf7171b92b5f8a2540d9b9a8942b

  • C:\Program Files\Common Files\Microsoft Shared\MSInfo\1D11D1E\FKC.WYA

    Filesize

    108KB

    MD5

    f697e0c5c1d34f00d1700d6d549d4811

    SHA1

    f50a99377a7419185fc269bb4d12954ca42b8589

    SHA256

    1eacebb614305a9806113545be7b23cf14ce7e761ccf634510a7f1c0cfb6cd16

    SHA512

    d5f35672f208ebbe306beeb55dadde96aa330780e2ea84b45d3fa6af41369e357412d82978df74038f2d27dff4d06905fd0b4d852b0beef1bcfdd6a0849bc202

  • C:\Program Files\Common Files\Microsoft Shared\MSInfo\1D11D1E\KVEIF.jpg

    Filesize

    125KB

    MD5

    77f4889871646aa3417a584cca58f848

    SHA1

    97d5ec366b87565ac5768390e991a73f13a04734

    SHA256

    bde4f8a0894cc40514bd35093dad97a0e9b37bddd57bab25550f12299c776eea

    SHA512

    9231a58c6bee118187f269a686d1cbbcdf3bae29b4cf0fd29fd41ea163ee2d8b9bd762ceacc3b0b781999e6cdd36666b4226a70b2a010eebfb417616344f1648

  • C:\Program Files\Common Files\Microsoft Shared\MSInfo\1D11D1E\KVEIFmain.ini

    Filesize

    711B

    MD5

    5b85700764c7f8ed2db3d99aba090ff3

    SHA1

    89521db8d1abb29e082628efdd23c547fa54ef44

    SHA256

    ade5e3636e8684f5845c18666a04a6b22d7a0f2631ea268a1aec910857c42e24

    SHA512

    00600e12dc1067eba53760eedfc4f408e88053a87462d55f01478887a9b4095138d471cc186684f0c14f4c2559da978e0ef3f78341910ecf1ca8caac9f67a642

  • C:\Program Files\Common Files\Microsoft Shared\MSInfo\1D11D1E\KVEIFss1.ini

    Filesize

    22B

    MD5

    453d2fc74da6d001a4fdd6734163c7c7

    SHA1

    ee0df26826350e252bfc43d21041053df079ca10

    SHA256

    f04003dc50539b7d9bbf491ecdab32b96b997377d8928bf4273a584e38eac98c

    SHA512

    6449257622d018a5c964ce4c1a1ead4f03db5bca23d0263aee775f096ef3063bbb61d0b1223c1f956a4de3468d3c55dae781d5851ccebc7c62dfd6e9e3d5a434

  • C:\Program Files\Common Files\Microsoft Shared\MSInfo\1D11D1E\ok.txt

    Filesize

    87B

    MD5

    869850ebc33a163b121b80bb5848ecc5

    SHA1

    b17501b7ad0b5bab29555fc333510440c953a547

    SHA256

    007db59a4947c8b1cd1d4b986d27f86ea3bdc624a794cb2c4c4cfed82e724d0f

    SHA512

    d71cdd9292402c6e8202869e9fb8bffcb146b168f5d3e65bdea81ced462ac4b4a2eb00b19eeaa59ca9908e3605ed57a64b4c97b7549f6f808de323faacfc24a8

  • C:\Program Files\Common Files\Microsoft\1D11D1E\KVEIF.jpg

    Filesize

    125KB

    MD5

    0e7c9948afc25a072d3588c69fa278ab

    SHA1

    85439685b33b767e69afc7a24c7b2774be8152c4

    SHA256

    5a90edc11de3649d941a216018e28a8f608a51c57b82d6eb385a5835832814f8

    SHA512

    0cf9f007d7e172db5bcf455ee37655c867edcad8dff519acba327c557b09515fc8ce68263d72b849a6fc2e33d3890dd410c76a412d90f02c28a752857706c057

  • C:\Program Files\Common Files\Microsoft\1D11D1E\KVEIF.jpg

    Filesize

    125KB

    MD5

    53eb6a9fd4c18cf405dcb7da75fcea1d

    SHA1

    7ee4b7056d43686d71721890c7716d5e2bd7d6f2

    SHA256

    29c9ba2348678c4ed19fe948c2a4416f94cc43f9c8568956361cd26ae28d1c8a

    SHA512

    bf01aded252b8d0bef17ce2436464f7a9968d6a1be1de4c3f80f51377972134cabda8a26f964a46da90fa236387b949d27bd60f92c10e141cb5adc6830c4d42c

  • \Windows\SysWOW64\kernel64.dll

    Filesize

    1.1MB

    MD5

    9b98d47916ead4f69ef51b56b0c2323c

    SHA1

    290a80b4ded0efc0fd00816f373fcea81a521330

    SHA256

    96e0ae104c9662d0d20fdf59844c2d18334e5847b6c4fc7f8ce4b3b87f39887b

    SHA512

    68b67021f228d8d71df4deb0b6388558b2f935a6aa466a12199cd37ada47ee588ea407b278d190d3a498b0ef3f5f1a2573a469b7ea5561ab2e7055c45565fe94

  • memory/2220-13-0x0000000001C60000-0x0000000001CB5000-memory.dmp

    Filesize

    340KB

  • memory/2220-24-0x0000000001C60000-0x0000000001CB5000-memory.dmp

    Filesize

    340KB

  • memory/2220-21-0x0000000001C60000-0x0000000001CB5000-memory.dmp

    Filesize

    340KB

  • memory/2220-19-0x0000000001C60000-0x0000000001CB5000-memory.dmp

    Filesize

    340KB

  • memory/2220-32-0x0000000001C60000-0x0000000001CB5000-memory.dmp

    Filesize

    340KB

  • memory/2220-33-0x0000000001C60000-0x0000000001CB5000-memory.dmp

    Filesize

    340KB

  • memory/2220-17-0x0000000001C60000-0x0000000001CB5000-memory.dmp

    Filesize

    340KB

  • memory/2220-15-0x0000000001C60000-0x0000000001CB5000-memory.dmp

    Filesize

    340KB

  • memory/2220-31-0x0000000001C60000-0x0000000001CB5000-memory.dmp

    Filesize

    340KB

  • memory/2220-29-0x0000000001C60000-0x0000000001CB5000-memory.dmp

    Filesize

    340KB

  • memory/2220-25-0x0000000001C60000-0x0000000001CB5000-memory.dmp

    Filesize

    340KB

  • memory/2220-27-0x0000000001C60000-0x0000000001CB5000-memory.dmp

    Filesize

    340KB

  • memory/2220-9-0x0000000001C60000-0x0000000001CB5000-memory.dmp

    Filesize

    340KB

  • memory/2220-11-0x0000000001C60000-0x0000000001CB5000-memory.dmp

    Filesize

    340KB

  • memory/2220-7-0x0000000001C60000-0x0000000001CB5000-memory.dmp

    Filesize

    340KB

  • memory/2220-5-0x0000000001C60000-0x0000000001CB5000-memory.dmp

    Filesize

    340KB

  • memory/2220-3-0x0000000001C60000-0x0000000001CB5000-memory.dmp

    Filesize

    340KB

  • memory/2220-2-0x0000000001C60000-0x0000000001CB5000-memory.dmp

    Filesize

    340KB

  • memory/2488-80-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/2488-90-0x0000000000100000-0x0000000000155000-memory.dmp

    Filesize

    340KB

  • memory/2488-92-0x0000000000100000-0x0000000000155000-memory.dmp

    Filesize

    340KB

  • memory/2488-74-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/2488-78-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/2488-102-0x0000000000100000-0x0000000000155000-memory.dmp

    Filesize

    340KB

  • memory/2488-98-0x0000000000100000-0x0000000000155000-memory.dmp

    Filesize

    340KB

  • memory/2488-96-0x0000000000100000-0x0000000000155000-memory.dmp

    Filesize

    340KB

  • memory/2488-94-0x0000000000100000-0x0000000000155000-memory.dmp

    Filesize

    340KB

  • memory/2488-88-0x0000000000100000-0x0000000000155000-memory.dmp

    Filesize

    340KB

  • memory/2488-86-0x0000000000100000-0x0000000000155000-memory.dmp

    Filesize

    340KB

  • memory/2488-84-0x0000000000100000-0x0000000000155000-memory.dmp

    Filesize

    340KB

  • memory/2488-104-0x0000000000100000-0x0000000000155000-memory.dmp

    Filesize

    340KB

  • memory/2488-101-0x0000000000100000-0x0000000000155000-memory.dmp

    Filesize

    340KB

  • memory/2488-82-0x0000000000100000-0x0000000000155000-memory.dmp

    Filesize

    340KB

  • memory/2488-81-0x0000000000100000-0x0000000000155000-memory.dmp

    Filesize

    340KB

  • memory/2488-77-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/2488-170-0x00000000001E0000-0x00000000001E1000-memory.dmp

    Filesize

    4KB

  • memory/2488-73-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB

  • memory/2488-70-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2488-255-0x0000000000400000-0x000000000042D000-memory.dmp

    Filesize

    180KB