Analysis

  • max time kernel
    140s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 00:50

General

  • Target

    65e1bd11571daa5d55a043b63ac99b40_NeikiAnalytics.exe

  • Size

    5.1MB

  • MD5

    65e1bd11571daa5d55a043b63ac99b40

  • SHA1

    d48f5b1a76bda9a36ade32df346fa4b7e9b602b5

  • SHA256

    87e12f930cf4eac0a853c9ae4d8df0208fe50668e2b683edc92ca2a751f2b24c

  • SHA512

    61ea4420cd4f2a27ca138cf208dcc5d4250d6c0e0afe5b4c2613c989c732aab6e0b632d9ad34ac5923cd23d111af9cf9f0bfef1466f91b4ac7c7f6f703dfb32e

  • SSDEEP

    98304:eof0ZhkXctoGlAMz8DqTD+Uac4Fy7/EefFIwkOJq4Lt6+2/3V:ewl4799zkOJq+6H/l

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 60 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\65e1bd11571daa5d55a043b63ac99b40_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\65e1bd11571daa5d55a043b63ac99b40_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:1424

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\16BC.tmp

    Filesize

    1KB

    MD5

    ee9026d61e6c76fc4e486dee750cc7b3

    SHA1

    d6af4d00be60fcd74e2dfd1904d2fa79b660650a

    SHA256

    8537fb01b5f97b0ae51334e26137ea78941d4c017f2662f0c1c19928ee1daaad

    SHA512

    7e1e1fc2e28c16f16326fb50c7c88b4e3191db719bbc81d3ebc5dac2b77bff34bab7879d92611eb00cba6c28cab7af23b18e9adfc66b035ec9f1f11f45690dcc

  • C:\Users\Admin\AppData\Local\Temp\65e1bd11571daa5d55a043b63ac99b40_NeikiAnalytics.ini

    Filesize

    242B

    MD5

    337107f41e6d082a02cd9cf792a6c846

    SHA1

    47458b497fe0df09e94b4fe60a9a7b3c445a3df3

    SHA256

    060eed3b7e30d9bbd4400700953e87811bc68d1a85ea826e13bf485f7863154c

    SHA512

    2de3b4b43d1f1323c459bcb201b706ad1d50bc5528ef50c3f4d3576097c19d33127d4f67fb4bcbfa1182e5e5f84372a868136991b913134604d5c5d227e0885e

  • C:\Users\Admin\AppData\Local\Temp\65e1bd11571daa5d55a043b63ac99b40_NeikiAnalytics.ini

    Filesize

    381B

    MD5

    4e18181f15644642f6dc2e34c6af1fe8

    SHA1

    d6ecde4272ec3ca6fe238f92547f65f39bdd61e1

    SHA256

    5177934f4266a0794a7ff1431c9d29bd3b378b1f65ee0427303cb547b79927fd

    SHA512

    5f577bd2893998051c70617460b9e2b580a4ca54d8d509fef1658dbc5962b1c070ac31909f522fe66aa48c9b3ca8e39733ffcc9204176958eed30dae1ab69ada

  • C:\Users\Admin\AppData\Local\Temp\65e1bd11571daa5d55a043b63ac99b40_NeikiAnalytics.ini

    Filesize

    103B

    MD5

    e683658bba9d154c56cc10ad4797edc8

    SHA1

    278ad46cd1261f315dec36b53919fa46788f1c9a

    SHA256

    8c06ddb1f705fa3bf72dd055e72881c205ef79b8217e379babdac8da666b3f97

    SHA512

    2d0a7a24dbdbe84e2d8f54482dc25a456b016ff65eaacce2d51c4891768db2768a53d08a97ec54cea8dbb167ef2f61dcfafad458d184259f09919b96cf0c1b89

  • C:\Users\Admin\AppData\Local\Temp\uservar.ini

    Filesize

    1KB

    MD5

    d38d79d3036807402e708ca61860fb62

    SHA1

    881aebf846f2098e2c9e75e825d6d9536ebb7ec0

    SHA256

    35aab5691e816824257b3ea097d6f344eaeb710f9205a0d0e0c2dd91b74493df

    SHA512

    e5d3bd804d6c31288a7ea1b9c4fee32de444734077c4097fd62d2b190d3700b4a0aac66100eec56431ae684dd2eb8ee00b8e873654c2cd834712769151279e90

  • C:\Users\Admin\AppData\Local\Temp\uservar.ini

    Filesize

    2KB

    MD5

    2ec6b450d07ab69c1af729b43fcefafb

    SHA1

    0f127f64a9bdf5c247ab509169dcc4806a8303d1

    SHA256

    95947135ff1a92d9a54bbd1ca34cccf0cef488fe80784a9361776e29032fca1d

    SHA512

    0a855f5bb3bc74825c871b7e96a74c78f219aaaba2937c8b6e5d214cce51ac91558b17456bde0fa12a5d44739967adf512b971738580b74ad2bf769184ee6d68

  • \Users\Admin\AppData\Local\Temp\cfgdll.dll

    Filesize

    57KB

    MD5

    cae466bc7eed9b385c7ab245251090c0

    SHA1

    9557828608f7f3d2191d441e4800924372525a4c

    SHA256

    9538efe16214e1bf1c177210b7422b250fa9f06efcccef47a7eec94d33648db8

    SHA512

    248d2e713a81e8601ab755bb01f6d32f655eec72ed83a9f03729b686ec36a50f92928d16d1f08b0a803f68779a2411db7f2629997ccae39ad53275aeb0df35d0

  • \Users\Admin\AppData\Roaming\qmacro\qdisp.dll

    Filesize

    43KB

    MD5

    b83df78ade7b743ad2850702ad007819

    SHA1

    47a547638f058083c15e63dd3c8fc6d64f39a597

    SHA256

    b7b7f155fd7f5c797075b1b81472ab180426703a93eef476b181f0fd54460b39

    SHA512

    e0d90240e17b348d349d02e98266394cd46e0439c18403959bc13ca9df613f4722cee3a9a9453351e8221d8375a8ef6058f8d5327c8749cef0081127db3c7f00

  • memory/1424-253-0x0000000000400000-0x0000000000704000-memory.dmp

    Filesize

    3.0MB

  • memory/1424-279-0x0000000000400000-0x0000000000704000-memory.dmp

    Filesize

    3.0MB

  • memory/1424-26-0x0000000000A60000-0x0000000000A6E000-memory.dmp

    Filesize

    56KB

  • memory/1424-254-0x0000000000400000-0x0000000000704000-memory.dmp

    Filesize

    3.0MB

  • memory/1424-255-0x0000000000400000-0x0000000000704000-memory.dmp

    Filesize

    3.0MB

  • memory/1424-267-0x0000000000400000-0x0000000000704000-memory.dmp

    Filesize

    3.0MB

  • memory/1424-268-0x0000000000400000-0x0000000000704000-memory.dmp

    Filesize

    3.0MB

  • memory/1424-252-0x0000000000400000-0x0000000000704000-memory.dmp

    Filesize

    3.0MB

  • memory/1424-280-0x0000000000400000-0x0000000000704000-memory.dmp

    Filesize

    3.0MB

  • memory/1424-281-0x0000000000400000-0x0000000000704000-memory.dmp

    Filesize

    3.0MB

  • memory/1424-282-0x0000000000400000-0x0000000000704000-memory.dmp

    Filesize

    3.0MB

  • memory/1424-283-0x0000000000400000-0x0000000000704000-memory.dmp

    Filesize

    3.0MB

  • memory/1424-284-0x0000000000400000-0x0000000000704000-memory.dmp

    Filesize

    3.0MB

  • memory/1424-285-0x0000000000400000-0x0000000000704000-memory.dmp

    Filesize

    3.0MB

  • memory/1424-286-0x0000000000400000-0x0000000000704000-memory.dmp

    Filesize

    3.0MB