Analysis

  • max time kernel
    124s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 01:23

General

  • Target

    6c697736dd88c36f5690b8e0473758e0_NeikiAnalytics.exe

  • Size

    42KB

  • MD5

    6c697736dd88c36f5690b8e0473758e0

  • SHA1

    70c8fa9b13c322d8a95e146b4bbda17beff5a8f6

  • SHA256

    fe3d8f7d0164813eec33fee804a6bc970ad85fefc82877b01814a51dde55dbda

  • SHA512

    d10bb9066eafdef719fb3f16e13419623d1c8db55527554ae025cd37cbea03507f457b82a327079944f5fe6fdebb4ceacf6627a2af45fbacb80655a56763e101

  • SSDEEP

    768:Q1eRH+9lFh0ul16sh7iQroCHpf+RjFBSuB2XpOk:Q0l+Z16sh7iQroCURB0ufk

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6c697736dd88c36f5690b8e0473758e0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\6c697736dd88c36f5690b8e0473758e0_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3024
    • C:\Users\Admin\AppData\Local\Temp\bkgrnd.exe
      "C:\Users\Admin\AppData\Local\Temp\bkgrnd.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:1276

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    63a0c77ca91a46f6d5d2c293fdfa5e1d

    SHA1

    db00ef46a45bb60ec5cb958a6dafb882ecc4912b

    SHA256

    c21a704c08057dd0e7b4e30d6e1128521a07d40075230f1184edc6d276effe95

    SHA512

    1a0d5bcbead6d0e67b69506a02ce4138ecda765a63ea52c607bee1febeaba5b3819874a8f29e50ff18470eeba3c2016ce3c5e7c3ad4b7ea34454ebe5f65dc4ed

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    0dc5a24fbc5701c2dab893cf29371b68

    SHA1

    e36f6bac9585512d900b755b4aaa3330ca1cdb07

    SHA256

    0c6c1f5e4f865bfe12c86692d40ac277d0793856f80126d849ffb9ed8062998a

    SHA512

    6558e8d7c163eb689a658520acdc7a30c6cc17655dc770778a3425c0b0b5343e21e7cb091fdc31cf56559a2ee038c1d4d0f6542ac9ab553ef105f9e52528a926

  • C:\Users\Admin\AppData\Local\Temp\Tar1F29.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • \Users\Admin\AppData\Local\Temp\bkgrnd.exe

    Filesize

    42KB

    MD5

    c251fd322d241a16f47e869f79fcfd3a

    SHA1

    1ddae44943db532ba57cdae96fb467dcbe076b1b

    SHA256

    5cdfb472b476bbac071a984e34b3fc9f54c9858c8305c4c96d25d6da0810f660

    SHA512

    59f57cb5187166187eb7ae67d7e912e6fac208cf78d31840f8c4b94f222fa6009b5ea22f44525ad9af4320349bbf9e66b59c97a66b097da82378423fa0ea9776

  • memory/1276-9-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/3024-1-0x0000000004000000-0x0000000004006000-memory.dmp

    Filesize

    24KB

  • memory/3024-0-0x0000000004000000-0x0000000004006000-memory.dmp

    Filesize

    24KB

  • memory/3024-3-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB