Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:41
Static task
static1
Behavioral task
behavioral1
Sample
6fb6d38918f7505534eb9c6b8b725ec0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6fb6d38918f7505534eb9c6b8b725ec0_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
6fb6d38918f7505534eb9c6b8b725ec0_NeikiAnalytics.exe
-
Size
12KB
-
MD5
6fb6d38918f7505534eb9c6b8b725ec0
-
SHA1
c9bc0eaa7856c4cd232eb6a97f195daf9abab393
-
SHA256
c5d939da596ded4aedfd409e42906d056f472b6edf91ca6e4914221db77dacef
-
SHA512
7ef5daa15e6dc49169dec60186283cb71a6079b1e13aa530b81da74b1e3cea2bd71ef64ddfae760d9caa90ef0bfdeacd65855b2f04364aa8b9a596456ef044b2
-
SSDEEP
384:8L7li/2z9q2DcEQvd2cJKLTp/NK9xaoU:alM8Q9coU
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
tmp24E0.tmp.exepid process 2708 tmp24E0.tmp.exe -
Executes dropped EXE 1 IoCs
Processes:
tmp24E0.tmp.exepid process 2708 tmp24E0.tmp.exe -
Loads dropped DLL 1 IoCs
Processes:
6fb6d38918f7505534eb9c6b8b725ec0_NeikiAnalytics.exepid process 2036 6fb6d38918f7505534eb9c6b8b725ec0_NeikiAnalytics.exe -
Uses the VBS compiler for execution 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
6fb6d38918f7505534eb9c6b8b725ec0_NeikiAnalytics.exedescription pid process Token: SeDebugPrivilege 2036 6fb6d38918f7505534eb9c6b8b725ec0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
6fb6d38918f7505534eb9c6b8b725ec0_NeikiAnalytics.exevbc.exedescription pid process target process PID 2036 wrote to memory of 1220 2036 6fb6d38918f7505534eb9c6b8b725ec0_NeikiAnalytics.exe vbc.exe PID 2036 wrote to memory of 1220 2036 6fb6d38918f7505534eb9c6b8b725ec0_NeikiAnalytics.exe vbc.exe PID 2036 wrote to memory of 1220 2036 6fb6d38918f7505534eb9c6b8b725ec0_NeikiAnalytics.exe vbc.exe PID 2036 wrote to memory of 1220 2036 6fb6d38918f7505534eb9c6b8b725ec0_NeikiAnalytics.exe vbc.exe PID 1220 wrote to memory of 2324 1220 vbc.exe cvtres.exe PID 1220 wrote to memory of 2324 1220 vbc.exe cvtres.exe PID 1220 wrote to memory of 2324 1220 vbc.exe cvtres.exe PID 1220 wrote to memory of 2324 1220 vbc.exe cvtres.exe PID 2036 wrote to memory of 2708 2036 6fb6d38918f7505534eb9c6b8b725ec0_NeikiAnalytics.exe tmp24E0.tmp.exe PID 2036 wrote to memory of 2708 2036 6fb6d38918f7505534eb9c6b8b725ec0_NeikiAnalytics.exe tmp24E0.tmp.exe PID 2036 wrote to memory of 2708 2036 6fb6d38918f7505534eb9c6b8b725ec0_NeikiAnalytics.exe tmp24E0.tmp.exe PID 2036 wrote to memory of 2708 2036 6fb6d38918f7505534eb9c6b8b725ec0_NeikiAnalytics.exe tmp24E0.tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fb6d38918f7505534eb9c6b8b725ec0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\6fb6d38918f7505534eb9c6b8b725ec0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\34j0ki3l\34j0ki3l.cmdline"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES2694.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcFEB3D7C197E2478FBBC6911D35B75B0.TMP"3⤵
-
C:\Users\Admin\AppData\Local\Temp\tmp24E0.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp24E0.tmp.exe" C:\Users\Admin\AppData\Local\Temp\6fb6d38918f7505534eb9c6b8b725ec0_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\34j0ki3l\34j0ki3l.0.vbFilesize
2KB
MD53974a7cbeec3b44333aa18eb72133282
SHA1bf59ed62b0c109060203e514c5f4aae06fdbd21b
SHA256d75c4f18da263e9f24c0a0bf1ec3801ff921975f3a7584418b5a7c85ef71e14e
SHA51241ba6c1bce148eebbcdd36b73aeede0f3881a49f6d5dbe5a6dde2b255a295d00543ca4b4e5125cd4dc9bced559c67e785ce2f1dcf1c2896dea3fbed2bdf933c8
-
C:\Users\Admin\AppData\Local\Temp\34j0ki3l\34j0ki3l.cmdlineFilesize
273B
MD5c5f8cbfe468cbf39609aa1776a3d037d
SHA1d9088f8ae22b0c52c16bfd55865cf83fe0cd51da
SHA25665d9d93af73d28df31a4fd4da5967b1e477ed909c1b74f239de11a74059fe134
SHA5122008fc0458a51b09e43f298ba310a82af3e0a25339885116c3272bd817b9c6f6f659dc10722a9e38afe72ebfef574dc435a6262bdc165a4b4c6a62016d5d3025
-
C:\Users\Admin\AppData\Local\Temp\RE.resourcesFilesize
2KB
MD593839726a3eadd78ef9b050ec3d6b9ea
SHA10aea49beeb7f5fa1d4d5370a3f2a0277516cd683
SHA256066998c5bfce98e321cd91a1d133f58dea679d61113a64d1615e7749b51149a3
SHA51249965c63dab7b39c1f59e1afe61e79e050e6b1d150556056f899b50e27099513115fa6eeb0c1be02e309f1091b802aad07997d8f9b64e0bbf095dbcef8882712
-
C:\Users\Admin\AppData\Local\Temp\RES2694.tmpFilesize
1KB
MD582273d6f1291c41b2d32395097ce41fd
SHA1afb9e1d40eb883901575faddd54db514f8524bfe
SHA256c82b75e9833d360a8195801eda0f71a4bd9c7e2000573fb21077baf68efea80c
SHA512d79d413cd349aa63bb5bd21113eedaf2310c5dc8f5f68d8e40627106694b2b0fc43d6413e9b05fe4f2aab342215376b202c292fd9d066d8d06bfe0fdb6ce8e8d
-
C:\Users\Admin\AppData\Local\Temp\tmp24E0.tmp.exeFilesize
12KB
MD58549ffb33218226a24cc44e14550a440
SHA19de7b993fc057bc8def02cfe64542d426ad496be
SHA256634057b1a1bc4e9495965067f6442bf53e80344581f0c0a01cac0ed09ac8c3e5
SHA512a8ae9dc920c7cdb22cc033d1599c765c91045d576e210f10559b3bf1a5d751186238efc747cff89d7e051f3eed64a13cb69d1b200707129cf8160d7f39258a26
-
C:\Users\Admin\AppData\Local\Temp\vbcFEB3D7C197E2478FBBC6911D35B75B0.TMPFilesize
1KB
MD5949274553908e33217ca9ee784ae0220
SHA128babe474c7f49865609ff17aaff1ef87e32efcd
SHA2561d1b64229ce4336908b5e5bde34370192c56a15120001a550abdaceb04f69a91
SHA5120c9715f28f1d18cfc6bfa1daff21a33e1f584528a08c2bdcf20134808de6851856c0186bb21d957cccc579a52bd905a1f93c3e6bc53ab18538651e5256f1e5c4
-
memory/2036-0-0x000000007488E000-0x000000007488F000-memory.dmpFilesize
4KB
-
memory/2036-1-0x0000000000D90000-0x0000000000D9A000-memory.dmpFilesize
40KB
-
memory/2036-7-0x0000000074880000-0x0000000074F6E000-memory.dmpFilesize
6.9MB
-
memory/2036-24-0x0000000074880000-0x0000000074F6E000-memory.dmpFilesize
6.9MB
-
memory/2708-23-0x00000000003B0000-0x00000000003BA000-memory.dmpFilesize
40KB