Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 01:20

General

  • Target

    6bd7d845dad11b129610cecb95363420_NeikiAnalytics.exe

  • Size

    12KB

  • MD5

    6bd7d845dad11b129610cecb95363420

  • SHA1

    c55817f8e4e0829a069b39e34e4be53f4bfc7867

  • SHA256

    93e5a119dc68e8f939198a6204773d6ae53c131aabc3fe5fdc5aa4976187b760

  • SHA512

    e3753e45aa6e1b53b60f4156b358e7e60b7ce96ffb847a856ce24e783d053f03928391cdbb7bbc8d0f64c4b0982b3043b813767401fbadbb1f2fb249b56c24e9

  • SSDEEP

    384:AL7li/2z1q2DcEQvdhcJKLTp/NK9xaC/:eNM/Q9cC/

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6bd7d845dad11b129610cecb95363420_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\6bd7d845dad11b129610cecb95363420_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1616
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\f1vr1gil\f1vr1gil.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2140
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES24B0.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcB3327068EBDE4BC598B02EFFAAE07A73.TMP"
        3⤵
          PID:2724
      • C:\Users\Admin\AppData\Local\Temp\tmp231B.tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\tmp231B.tmp.exe" C:\Users\Admin\AppData\Local\Temp\6bd7d845dad11b129610cecb95363420_NeikiAnalytics.exe
        2⤵
        • Deletes itself
        • Executes dropped EXE
        PID:2116

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RE.resources

      Filesize

      2KB

      MD5

      5f9dfc8c99033112f798257ae2d268b2

      SHA1

      38fef9656335bf4f4b6cd544cc0eed73b6aa0efd

      SHA256

      6277037a196c99a7865490a230970894fce065525280a30f2e08eb2658a47ea7

      SHA512

      fc2245e84853b6cde1ab284b47b4d031bdcf0b82d4bc22b7aceb92ce9823a7451348c5af1cb68884012dcadad1b6ebfb2eaa57d3f9f1711b478fd82b38b9914b

    • C:\Users\Admin\AppData\Local\Temp\RES24B0.tmp

      Filesize

      1KB

      MD5

      107a8e427703f96ada87acda9d2ace17

      SHA1

      e309a277bf5482f73bbff52c9fe9d25a101160d1

      SHA256

      1c610e87041704db0dce73c1874cdff5c4dd7a34ffb324b462559c81e4713726

      SHA512

      093e03d4453bb2b02981ae0c7ef41e606df27b448998d4e558142554ae920321ab39684dd5ff6dc231654b6c2cbba879554d228567a491870dc14b70dc32aa05

    • C:\Users\Admin\AppData\Local\Temp\f1vr1gil\f1vr1gil.0.vb

      Filesize

      2KB

      MD5

      c7fc0eda261d42cb26f7c63498877ad5

      SHA1

      9ce0a589e136e99d0a2bd2ac9b5b615d78a5a79e

      SHA256

      43e6890ce2d222e206172ca93193b585384d29acabe0109db2b417c2c540ff41

      SHA512

      fd1501cef97bb3d786bd35bee362961366e816e7efad281e244efaf0ebbda74844ee9839885a52e0ca1199050b179bfacecda232290bd4bb761efc83f944c472

    • C:\Users\Admin\AppData\Local\Temp\f1vr1gil\f1vr1gil.cmdline

      Filesize

      273B

      MD5

      2a999c5bf736cc6439f3be1b311de4b3

      SHA1

      c57314bdd2eef3e0901701d1addfa5d097ccd517

      SHA256

      8b3ed630ab49099b971ae2fa557395ca2ccf61cdd6b45609328b5915b1e9ba34

      SHA512

      68fe96756dcf81c68429fb00633f73a1b91e2eb68fcd65d7598be8a58cf1ad32a0cb5f4db7d2fde39fde6c66f9ef1aa9b94c4b5e2a6a7430e7953dc64e61d42b

    • C:\Users\Admin\AppData\Local\Temp\tmp231B.tmp.exe

      Filesize

      12KB

      MD5

      90ec3b64371ca5e9b5f885997e743b48

      SHA1

      0b1d6dd19e55659bab79e3fe28821451276ff82f

      SHA256

      76cbc19f3830b8f347a0f5e7b129248c8e9939639c768b4c2d4f2d1c26720634

      SHA512

      b512071b81918fa86b60a4e2d58eb86f4f6759970760fbb7656f36f229da633bc90a507382b5d75e57e38f748ccf6fd0887e62653fffcad8ad5cfc019b83e116

    • C:\Users\Admin\AppData\Local\Temp\vbcB3327068EBDE4BC598B02EFFAAE07A73.TMP

      Filesize

      1KB

      MD5

      c560d55a13c6102f3f3443648b9b548d

      SHA1

      36c64fad68daa0d1763a747e3e4bff86aed6418e

      SHA256

      63ae68bac53cafc43a078351393a965a2300928d8363fb1c4335b9e779c827d4

      SHA512

      c8b516c71d9a8c5c28ae00d589f58b12a22d1128ff49bb24fc16a9671ed5d89383abea290ef7b510ed2d60ac02b087ad7e5ce2bd17116244dc189ad670494ab2

    • memory/1616-0-0x0000000073EBE000-0x0000000073EBF000-memory.dmp

      Filesize

      4KB

    • memory/1616-1-0x0000000000870000-0x000000000087A000-memory.dmp

      Filesize

      40KB

    • memory/1616-8-0x0000000073EB0000-0x000000007459E000-memory.dmp

      Filesize

      6.9MB

    • memory/1616-23-0x0000000073EB0000-0x000000007459E000-memory.dmp

      Filesize

      6.9MB

    • memory/2116-24-0x0000000000140000-0x000000000014A000-memory.dmp

      Filesize

      40KB