Analysis

  • max time kernel
    140s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 00:50

General

  • Target

    65e1bd11571daa5d55a043b63ac99b40_NeikiAnalytics.exe

  • Size

    5.1MB

  • MD5

    65e1bd11571daa5d55a043b63ac99b40

  • SHA1

    d48f5b1a76bda9a36ade32df346fa4b7e9b602b5

  • SHA256

    87e12f930cf4eac0a853c9ae4d8df0208fe50668e2b683edc92ca2a751f2b24c

  • SHA512

    61ea4420cd4f2a27ca138cf208dcc5d4250d6c0e0afe5b4c2613c989c732aab6e0b632d9ad34ac5923cd23d111af9cf9f0bfef1466f91b4ac7c7f6f703dfb32e

  • SSDEEP

    98304:eof0ZhkXctoGlAMz8DqTD+Uac4Fy7/EefFIwkOJq4Lt6+2/3V:ewl4799zkOJq+6H/l

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 60 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\65e1bd11571daa5d55a043b63ac99b40_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\65e1bd11571daa5d55a043b63ac99b40_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:2092
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4232,i,13879737908471496610,15335851594401413307,262144 --variations-seed-version --mojo-platform-channel-handle=3756 /prefetch:8
    1⤵
      PID:1672

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\65e1bd11571daa5d55a043b63ac99b40_NeikiAnalytics.ini

      Filesize

      381B

      MD5

      4e18181f15644642f6dc2e34c6af1fe8

      SHA1

      d6ecde4272ec3ca6fe238f92547f65f39bdd61e1

      SHA256

      5177934f4266a0794a7ff1431c9d29bd3b378b1f65ee0427303cb547b79927fd

      SHA512

      5f577bd2893998051c70617460b9e2b580a4ca54d8d509fef1658dbc5962b1c070ac31909f522fe66aa48c9b3ca8e39733ffcc9204176958eed30dae1ab69ada

    • C:\Users\Admin\AppData\Local\Temp\65e1bd11571daa5d55a043b63ac99b40_NeikiAnalytics.ini

      Filesize

      103B

      MD5

      e683658bba9d154c56cc10ad4797edc8

      SHA1

      278ad46cd1261f315dec36b53919fa46788f1c9a

      SHA256

      8c06ddb1f705fa3bf72dd055e72881c205ef79b8217e379babdac8da666b3f97

      SHA512

      2d0a7a24dbdbe84e2d8f54482dc25a456b016ff65eaacce2d51c4891768db2768a53d08a97ec54cea8dbb167ef2f61dcfafad458d184259f09919b96cf0c1b89

    • C:\Users\Admin\AppData\Local\Temp\65e1bd11571daa5d55a043b63ac99b40_NeikiAnalytics.ini

      Filesize

      242B

      MD5

      337107f41e6d082a02cd9cf792a6c846

      SHA1

      47458b497fe0df09e94b4fe60a9a7b3c445a3df3

      SHA256

      060eed3b7e30d9bbd4400700953e87811bc68d1a85ea826e13bf485f7863154c

      SHA512

      2de3b4b43d1f1323c459bcb201b706ad1d50bc5528ef50c3f4d3576097c19d33127d4f67fb4bcbfa1182e5e5f84372a868136991b913134604d5c5d227e0885e

    • C:\Users\Admin\AppData\Local\Temp\F6A4.tmp

      Filesize

      1KB

      MD5

      ee9026d61e6c76fc4e486dee750cc7b3

      SHA1

      d6af4d00be60fcd74e2dfd1904d2fa79b660650a

      SHA256

      8537fb01b5f97b0ae51334e26137ea78941d4c017f2662f0c1c19928ee1daaad

      SHA512

      7e1e1fc2e28c16f16326fb50c7c88b4e3191db719bbc81d3ebc5dac2b77bff34bab7879d92611eb00cba6c28cab7af23b18e9adfc66b035ec9f1f11f45690dcc

    • C:\Users\Admin\AppData\Local\Temp\cfgdll.dll

      Filesize

      57KB

      MD5

      cae466bc7eed9b385c7ab245251090c0

      SHA1

      9557828608f7f3d2191d441e4800924372525a4c

      SHA256

      9538efe16214e1bf1c177210b7422b250fa9f06efcccef47a7eec94d33648db8

      SHA512

      248d2e713a81e8601ab755bb01f6d32f655eec72ed83a9f03729b686ec36a50f92928d16d1f08b0a803f68779a2411db7f2629997ccae39ad53275aeb0df35d0

    • C:\Users\Admin\AppData\Local\Temp\uservar.ini

      Filesize

      1KB

      MD5

      d38d79d3036807402e708ca61860fb62

      SHA1

      881aebf846f2098e2c9e75e825d6d9536ebb7ec0

      SHA256

      35aab5691e816824257b3ea097d6f344eaeb710f9205a0d0e0c2dd91b74493df

      SHA512

      e5d3bd804d6c31288a7ea1b9c4fee32de444734077c4097fd62d2b190d3700b4a0aac66100eec56431ae684dd2eb8ee00b8e873654c2cd834712769151279e90

    • C:\Users\Admin\AppData\Roaming\qmacro\qdisp.dll

      Filesize

      43KB

      MD5

      b83df78ade7b743ad2850702ad007819

      SHA1

      47a547638f058083c15e63dd3c8fc6d64f39a597

      SHA256

      b7b7f155fd7f5c797075b1b81472ab180426703a93eef476b181f0fd54460b39

      SHA512

      e0d90240e17b348d349d02e98266394cd46e0439c18403959bc13ca9df613f4722cee3a9a9453351e8221d8375a8ef6058f8d5327c8749cef0081127db3c7f00

    • memory/2092-30-0x00000000042D0000-0x00000000042DE000-memory.dmp

      Filesize

      56KB

    • memory/2092-257-0x0000000000400000-0x0000000000704000-memory.dmp

      Filesize

      3.0MB

    • memory/2092-258-0x0000000000400000-0x0000000000704000-memory.dmp

      Filesize

      3.0MB

    • memory/2092-259-0x0000000000400000-0x0000000000704000-memory.dmp

      Filesize

      3.0MB

    • memory/2092-260-0x0000000000400000-0x0000000000704000-memory.dmp

      Filesize

      3.0MB

    • memory/2092-272-0x0000000000400000-0x0000000000704000-memory.dmp

      Filesize

      3.0MB