Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 00:33
Static task
static1
Behavioral task
behavioral1
Sample
62d82374f22f9beb1e2352c7c9741180_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
62d82374f22f9beb1e2352c7c9741180_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
62d82374f22f9beb1e2352c7c9741180_NeikiAnalytics.exe
-
Size
752KB
-
MD5
62d82374f22f9beb1e2352c7c9741180
-
SHA1
5a3440000135b9d161809bf5a9d7c73c0ad27066
-
SHA256
446e66276f6eddc97464bcc616504fd22affd151ac28d3d2a9aa05e041da2c41
-
SHA512
f869c872577feef4ea1c202874395fb1100bd3661bc4252b9133bb9e7c3eb419afe6dc7c1d472f5aae32f2828e80a859615c1c9b31332ebd5d5c2ed653b1a6d7
-
SSDEEP
3072:JtwizQTj8CSUYf8W3nSjen++Bj88OZS0/Qe2HdOLlqw1aQnj74y0+xkABerFFiWH:Tuj8NDF3OR9/Qe2Hdklrn4K3eP7H
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2952 cmd.exe -
Executes dropped EXE 5 IoCs
Processes:
casino_extensions.exeCasino_ext.execasino_extensions.exeCasino_ext.exeLiveMessageCenter.exepid process 2592 casino_extensions.exe 1936 Casino_ext.exe 2644 casino_extensions.exe 2564 Casino_ext.exe 2636 LiveMessageCenter.exe -
Loads dropped DLL 6 IoCs
Processes:
casino_extensions.execasino_extensions.execasino_extensions.exepid process 2488 casino_extensions.exe 2488 casino_extensions.exe 2536 casino_extensions.exe 2536 casino_extensions.exe 2540 casino_extensions.exe 2540 casino_extensions.exe -
Drops file in System32 directory 9 IoCs
Processes:
casino_extensions.execasino_extensions.execasino_extensions.execasino_extensions.exedescription ioc process File opened for modification C:\Windows\SysWOW64\casino_extensions.exe casino_extensions.exe File created C:\Windows\SysWOW64\casino_extensions.exe casino_extensions.exe File opened for modification C:\Windows\SysWOW64\casino_extensions.exe casino_extensions.exe File opened for modification C:\Windows\SysWOW64\casino_extensions.exe casino_extensions.exe File opened for modification C:\Windows\SysWOW64\LiveMessageCenter.exe casino_extensions.exe File opened for modification C:\Windows\SysWOW64\LiveMessageCenter.exe casino_extensions.exe File created C:\Windows\SysWOW64\casino_extensions.exe casino_extensions.exe File created C:\Windows\SysWOW64\LiveMessageCenter.exe casino_extensions.exe File opened for modification C:\Windows\SysWOW64\casino_extensions.exe casino_extensions.exe -
Drops file in Program Files directory 6 IoCs
Processes:
Casino_ext.execasino_extensions.exeCasino_ext.exeLiveMessageCenter.execasino_extensions.execasino_extensions.exedescription ioc process File opened for modification C:\Program Files (x86)\Internet Explorer\casino_extensions.exe Casino_ext.exe File opened for modification C:\Program Files (x86)\Internet Explorer\casino_extensions.exe casino_extensions.exe File opened for modification C:\Program Files (x86)\Internet Explorer\casino_extensions.exe Casino_ext.exe File opened for modification C:\Program Files (x86)\Internet Explorer\casino_extensions.exe LiveMessageCenter.exe File created C:\Program Files (x86)\Internet Explorer\$$202803s.bat casino_extensions.exe File opened for modification C:\Program Files (x86)\Internet Explorer\casino_extensions.exe casino_extensions.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
Casino_ext.exeCasino_ext.exeLiveMessageCenter.exepid process 1936 Casino_ext.exe 2564 Casino_ext.exe 2636 LiveMessageCenter.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
62d82374f22f9beb1e2352c7c9741180_NeikiAnalytics.exepid process 2020 62d82374f22f9beb1e2352c7c9741180_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 40 IoCs
Processes:
62d82374f22f9beb1e2352c7c9741180_NeikiAnalytics.execasino_extensions.execasino_extensions.exeCasino_ext.execasino_extensions.execasino_extensions.exeCasino_ext.execasino_extensions.exeLiveMessageCenter.execasino_extensions.exedescription pid process target process PID 2020 wrote to memory of 2488 2020 62d82374f22f9beb1e2352c7c9741180_NeikiAnalytics.exe casino_extensions.exe PID 2020 wrote to memory of 2488 2020 62d82374f22f9beb1e2352c7c9741180_NeikiAnalytics.exe casino_extensions.exe PID 2020 wrote to memory of 2488 2020 62d82374f22f9beb1e2352c7c9741180_NeikiAnalytics.exe casino_extensions.exe PID 2020 wrote to memory of 2488 2020 62d82374f22f9beb1e2352c7c9741180_NeikiAnalytics.exe casino_extensions.exe PID 2488 wrote to memory of 2592 2488 casino_extensions.exe casino_extensions.exe PID 2488 wrote to memory of 2592 2488 casino_extensions.exe casino_extensions.exe PID 2488 wrote to memory of 2592 2488 casino_extensions.exe casino_extensions.exe PID 2488 wrote to memory of 2592 2488 casino_extensions.exe casino_extensions.exe PID 2592 wrote to memory of 1936 2592 casino_extensions.exe Casino_ext.exe PID 2592 wrote to memory of 1936 2592 casino_extensions.exe Casino_ext.exe PID 2592 wrote to memory of 1936 2592 casino_extensions.exe Casino_ext.exe PID 2592 wrote to memory of 1936 2592 casino_extensions.exe Casino_ext.exe PID 1936 wrote to memory of 2536 1936 Casino_ext.exe casino_extensions.exe PID 1936 wrote to memory of 2536 1936 Casino_ext.exe casino_extensions.exe PID 1936 wrote to memory of 2536 1936 Casino_ext.exe casino_extensions.exe PID 1936 wrote to memory of 2536 1936 Casino_ext.exe casino_extensions.exe PID 2536 wrote to memory of 2644 2536 casino_extensions.exe casino_extensions.exe PID 2536 wrote to memory of 2644 2536 casino_extensions.exe casino_extensions.exe PID 2536 wrote to memory of 2644 2536 casino_extensions.exe casino_extensions.exe PID 2536 wrote to memory of 2644 2536 casino_extensions.exe casino_extensions.exe PID 2644 wrote to memory of 2564 2644 casino_extensions.exe Casino_ext.exe PID 2644 wrote to memory of 2564 2644 casino_extensions.exe Casino_ext.exe PID 2644 wrote to memory of 2564 2644 casino_extensions.exe Casino_ext.exe PID 2644 wrote to memory of 2564 2644 casino_extensions.exe Casino_ext.exe PID 2564 wrote to memory of 2540 2564 Casino_ext.exe casino_extensions.exe PID 2564 wrote to memory of 2540 2564 Casino_ext.exe casino_extensions.exe PID 2564 wrote to memory of 2540 2564 Casino_ext.exe casino_extensions.exe PID 2564 wrote to memory of 2540 2564 Casino_ext.exe casino_extensions.exe PID 2540 wrote to memory of 2636 2540 casino_extensions.exe LiveMessageCenter.exe PID 2540 wrote to memory of 2636 2540 casino_extensions.exe LiveMessageCenter.exe PID 2540 wrote to memory of 2636 2540 casino_extensions.exe LiveMessageCenter.exe PID 2540 wrote to memory of 2636 2540 casino_extensions.exe LiveMessageCenter.exe PID 2636 wrote to memory of 2580 2636 LiveMessageCenter.exe casino_extensions.exe PID 2636 wrote to memory of 2580 2636 LiveMessageCenter.exe casino_extensions.exe PID 2636 wrote to memory of 2580 2636 LiveMessageCenter.exe casino_extensions.exe PID 2636 wrote to memory of 2580 2636 LiveMessageCenter.exe casino_extensions.exe PID 2580 wrote to memory of 2952 2580 casino_extensions.exe cmd.exe PID 2580 wrote to memory of 2952 2580 casino_extensions.exe cmd.exe PID 2580 wrote to memory of 2952 2580 casino_extensions.exe cmd.exe PID 2580 wrote to memory of 2952 2580 casino_extensions.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\62d82374f22f9beb1e2352c7c9741180_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\62d82374f22f9beb1e2352c7c9741180_NeikiAnalytics.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Program Files (x86)\Internet Explorer\casino_extensions.exe"C:\Program Files (x86)\Internet Explorer\casino_extensions.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\casino_extensions.exeC:\Windows\system32\casino_extensions.exe3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\Casino_ext.exeC:\Windows\SysWOW64\Casino_ext.exe4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Program Files (x86)\Internet Explorer\casino_extensions.exe"C:\Program Files (x86)\Internet Explorer\casino_extensions.exe"5⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\casino_extensions.exeC:\Windows\system32\casino_extensions.exe6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\Casino_ext.exeC:\Windows\SysWOW64\Casino_ext.exe7⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Program Files (x86)\Internet Explorer\casino_extensions.exe"C:\Program Files (x86)\Internet Explorer\casino_extensions.exe"8⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\LiveMessageCenter.exeC:\Windows\system32\LiveMessageCenter.exe /part29⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Program Files (x86)\Internet Explorer\casino_extensions.exe"C:\Program Files (x86)\Internet Explorer\casino_extensions.exe"10⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\cmd.execmd /c $$2028~1.BAT11⤵
- Deletes itself
PID:2952
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81B
MD54777bf695815d870d27ed4a38a8f0840
SHA1565412b5182bca7a221448dba78369c42d1c4a0c
SHA256c08018226d9a45ab277a01ca35f519ff7ea1cb450d080e24b0f590739654241d
SHA51287e792d326c5a9d2d92984ec4c34d2af9d616a4676a7d69df73b09975fd077d96077ae2528b6fc05752110eb4e406c3e9d94d49d0a74eeaba6bc6a48bca8ac1d
-
Filesize
754KB
MD59fc7e75af82e1b3eba212f08b1b086c1
SHA1fcf31be969f3ccdfbd7ca7c75a5f71ff4d8116e4
SHA2567af6410e71014be95c8da1d91290ba7753a5d9c681f83163ef4aa027274bf8e7
SHA51211719ba1e5e04748ad881f8faab0348e5040b3b2bcb1071409a4fb88d29bfd29d5f9e74bf65a628c48ca38ff4fd35ded8898fa57fe57002acd2fce368f0a268f
-
Filesize
757KB
MD53916201ded86b6336d5d6bbba5bea0c3
SHA178927dc394b24de74a247f6d8394d5e2b4f70615
SHA256e04df5baf8e4487832bea047a9f24f2dc7a54173cccd1ed64b0056c2c3e623e1
SHA5127dce6d127509b5b299f0fd438fca279ec68d1b0d97f715d219bcb7bd2e9c188c328fded9688ac8d45957e7ca46109b5b6712593c80c4017957fc5ab5b9920232
-
Filesize
757KB
MD5a1edb4c65689c82619b19236d222ad7e
SHA1518d1d88f56caa5b75e7e6cdbd8cf460b69be220
SHA25665495f7c11327093a770af86480c4dec1e9bccb8d5feb619d76b76301ba4459c
SHA5120b7a8f62485f703e33bc6e1baf067f1763fc740ca4d4d60552621776f22726e6eb488873f578ba63ab1f5c46d59bfc873db0b4b9071a60372c5393daea5ab5ee