Analysis

  • max time kernel
    140s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    24/05/2024, 17:11

General

  • Target

    fafa0637dea13ff394884aeda30fe940_NeikiAnalytics.exe

  • Size

    5.5MB

  • MD5

    fafa0637dea13ff394884aeda30fe940

  • SHA1

    23a1e42d8028a3d178ac143ad5638e34a9efe830

  • SHA256

    9881604bc1264db5f7f24c57f8a68f8796e455d2456c07145f493157ac146ba8

  • SHA512

    6aef05608cccee41005a678cc22c4749dc3479292c07acbf0b9b34e74ea2000a5925f779bd90726d571d8a512b71ef9cfc4566e9af1b9da8752a1f8124405cbd

  • SSDEEP

    98304:eof0ZhkXctoGlAMz8DqTD+Uac4Fy7/EefFIwkOJq4Lt6+2/3/EtQ9s:ewl4799zkOJq+6H/c

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 60 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fafa0637dea13ff394884aeda30fe940_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\fafa0637dea13ff394884aeda30fe940_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:1708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\B37.tmp

    Filesize

    1KB

    MD5

    ee9026d61e6c76fc4e486dee750cc7b3

    SHA1

    d6af4d00be60fcd74e2dfd1904d2fa79b660650a

    SHA256

    8537fb01b5f97b0ae51334e26137ea78941d4c017f2662f0c1c19928ee1daaad

    SHA512

    7e1e1fc2e28c16f16326fb50c7c88b4e3191db719bbc81d3ebc5dac2b77bff34bab7879d92611eb00cba6c28cab7af23b18e9adfc66b035ec9f1f11f45690dcc

  • C:\Users\Admin\AppData\Local\Temp\fafa0637dea13ff394884aeda30fe940_NeikiAnalytics.ini

    Filesize

    242B

    MD5

    337107f41e6d082a02cd9cf792a6c846

    SHA1

    47458b497fe0df09e94b4fe60a9a7b3c445a3df3

    SHA256

    060eed3b7e30d9bbd4400700953e87811bc68d1a85ea826e13bf485f7863154c

    SHA512

    2de3b4b43d1f1323c459bcb201b706ad1d50bc5528ef50c3f4d3576097c19d33127d4f67fb4bcbfa1182e5e5f84372a868136991b913134604d5c5d227e0885e

  • C:\Users\Admin\AppData\Local\Temp\fafa0637dea13ff394884aeda30fe940_NeikiAnalytics.ini

    Filesize

    103B

    MD5

    e683658bba9d154c56cc10ad4797edc8

    SHA1

    278ad46cd1261f315dec36b53919fa46788f1c9a

    SHA256

    8c06ddb1f705fa3bf72dd055e72881c205ef79b8217e379babdac8da666b3f97

    SHA512

    2d0a7a24dbdbe84e2d8f54482dc25a456b016ff65eaacce2d51c4891768db2768a53d08a97ec54cea8dbb167ef2f61dcfafad458d184259f09919b96cf0c1b89

  • C:\Users\Admin\AppData\Local\Temp\uservar.ini

    Filesize

    1KB

    MD5

    d38d79d3036807402e708ca61860fb62

    SHA1

    881aebf846f2098e2c9e75e825d6d9536ebb7ec0

    SHA256

    35aab5691e816824257b3ea097d6f344eaeb710f9205a0d0e0c2dd91b74493df

    SHA512

    e5d3bd804d6c31288a7ea1b9c4fee32de444734077c4097fd62d2b190d3700b4a0aac66100eec56431ae684dd2eb8ee00b8e873654c2cd834712769151279e90

  • \Users\Admin\AppData\Local\Temp\cfgdll.dll

    Filesize

    57KB

    MD5

    cae466bc7eed9b385c7ab245251090c0

    SHA1

    9557828608f7f3d2191d441e4800924372525a4c

    SHA256

    9538efe16214e1bf1c177210b7422b250fa9f06efcccef47a7eec94d33648db8

    SHA512

    248d2e713a81e8601ab755bb01f6d32f655eec72ed83a9f03729b686ec36a50f92928d16d1f08b0a803f68779a2411db7f2629997ccae39ad53275aeb0df35d0

  • \Users\Admin\AppData\Roaming\qmacro\qdisp.dll

    Filesize

    43KB

    MD5

    b83df78ade7b743ad2850702ad007819

    SHA1

    47a547638f058083c15e63dd3c8fc6d64f39a597

    SHA256

    b7b7f155fd7f5c797075b1b81472ab180426703a93eef476b181f0fd54460b39

    SHA512

    e0d90240e17b348d349d02e98266394cd46e0439c18403959bc13ca9df613f4722cee3a9a9453351e8221d8375a8ef6058f8d5327c8749cef0081127db3c7f00

  • memory/1708-254-0x0000000000400000-0x0000000000704000-memory.dmp

    Filesize

    3.0MB

  • memory/1708-269-0x0000000000400000-0x0000000000704000-memory.dmp

    Filesize

    3.0MB

  • memory/1708-253-0x0000000000400000-0x0000000000704000-memory.dmp

    Filesize

    3.0MB

  • memory/1708-26-0x0000000000B00000-0x0000000000B0E000-memory.dmp

    Filesize

    56KB

  • memory/1708-255-0x0000000000400000-0x0000000000704000-memory.dmp

    Filesize

    3.0MB

  • memory/1708-267-0x0000000000400000-0x0000000000704000-memory.dmp

    Filesize

    3.0MB

  • memory/1708-268-0x0000000000400000-0x0000000000704000-memory.dmp

    Filesize

    3.0MB

  • memory/1708-252-0x0000000000400000-0x0000000000704000-memory.dmp

    Filesize

    3.0MB

  • memory/1708-270-0x0000000000400000-0x0000000000704000-memory.dmp

    Filesize

    3.0MB

  • memory/1708-282-0x0000000000400000-0x0000000000704000-memory.dmp

    Filesize

    3.0MB

  • memory/1708-283-0x0000000000400000-0x0000000000704000-memory.dmp

    Filesize

    3.0MB

  • memory/1708-284-0x0000000000400000-0x0000000000704000-memory.dmp

    Filesize

    3.0MB

  • memory/1708-285-0x0000000000400000-0x0000000000704000-memory.dmp

    Filesize

    3.0MB

  • memory/1708-286-0x0000000000400000-0x0000000000704000-memory.dmp

    Filesize

    3.0MB

  • memory/1708-287-0x0000000000400000-0x0000000000704000-memory.dmp

    Filesize

    3.0MB