Analysis

  • max time kernel
    141s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/05/2024, 17:11

General

  • Target

    fafa0637dea13ff394884aeda30fe940_NeikiAnalytics.exe

  • Size

    5.5MB

  • MD5

    fafa0637dea13ff394884aeda30fe940

  • SHA1

    23a1e42d8028a3d178ac143ad5638e34a9efe830

  • SHA256

    9881604bc1264db5f7f24c57f8a68f8796e455d2456c07145f493157ac146ba8

  • SHA512

    6aef05608cccee41005a678cc22c4749dc3479292c07acbf0b9b34e74ea2000a5925f779bd90726d571d8a512b71ef9cfc4566e9af1b9da8752a1f8124405cbd

  • SSDEEP

    98304:eof0ZhkXctoGlAMz8DqTD+Uac4Fy7/EefFIwkOJq4Lt6+2/3/EtQ9s:ewl4799zkOJq+6H/c

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 4 IoCs
  • Modifies registry class 60 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fafa0637dea13ff394884aeda30fe940_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\fafa0637dea13ff394884aeda30fe940_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:3424

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3400.tmp

    Filesize

    1KB

    MD5

    ee9026d61e6c76fc4e486dee750cc7b3

    SHA1

    d6af4d00be60fcd74e2dfd1904d2fa79b660650a

    SHA256

    8537fb01b5f97b0ae51334e26137ea78941d4c017f2662f0c1c19928ee1daaad

    SHA512

    7e1e1fc2e28c16f16326fb50c7c88b4e3191db719bbc81d3ebc5dac2b77bff34bab7879d92611eb00cba6c28cab7af23b18e9adfc66b035ec9f1f11f45690dcc

  • C:\Users\Admin\AppData\Local\Temp\cfgdll.dll

    Filesize

    57KB

    MD5

    cae466bc7eed9b385c7ab245251090c0

    SHA1

    9557828608f7f3d2191d441e4800924372525a4c

    SHA256

    9538efe16214e1bf1c177210b7422b250fa9f06efcccef47a7eec94d33648db8

    SHA512

    248d2e713a81e8601ab755bb01f6d32f655eec72ed83a9f03729b686ec36a50f92928d16d1f08b0a803f68779a2411db7f2629997ccae39ad53275aeb0df35d0

  • C:\Users\Admin\AppData\Local\Temp\fafa0637dea13ff394884aeda30fe940_NeikiAnalytics.ini

    Filesize

    381B

    MD5

    4e18181f15644642f6dc2e34c6af1fe8

    SHA1

    d6ecde4272ec3ca6fe238f92547f65f39bdd61e1

    SHA256

    5177934f4266a0794a7ff1431c9d29bd3b378b1f65ee0427303cb547b79927fd

    SHA512

    5f577bd2893998051c70617460b9e2b580a4ca54d8d509fef1658dbc5962b1c070ac31909f522fe66aa48c9b3ca8e39733ffcc9204176958eed30dae1ab69ada

  • C:\Users\Admin\AppData\Local\Temp\fafa0637dea13ff394884aeda30fe940_NeikiAnalytics.ini

    Filesize

    522B

    MD5

    a926b6394db93a44e7e470dfbf45fae6

    SHA1

    ad27002061254d46d17798a630607657356b5924

    SHA256

    5e12dceb92a715745c279638e173671af90f5cba6dbd254c0206d68d1cf1d18b

    SHA512

    51c2d687eea87ef05263ea063df0020bc40004b81fe73c02ca2ff91863b35dfd0005c9386783c2d13a028f0984b0b996f361b803de6fc3f4cd31180764a4e154

  • C:\Users\Admin\AppData\Local\Temp\fafa0637dea13ff394884aeda30fe940_NeikiAnalytics.ini

    Filesize

    103B

    MD5

    e683658bba9d154c56cc10ad4797edc8

    SHA1

    278ad46cd1261f315dec36b53919fa46788f1c9a

    SHA256

    8c06ddb1f705fa3bf72dd055e72881c205ef79b8217e379babdac8da666b3f97

    SHA512

    2d0a7a24dbdbe84e2d8f54482dc25a456b016ff65eaacce2d51c4891768db2768a53d08a97ec54cea8dbb167ef2f61dcfafad458d184259f09919b96cf0c1b89

  • C:\Users\Admin\AppData\Local\Temp\fafa0637dea13ff394884aeda30fe940_NeikiAnalytics.ini

    Filesize

    242B

    MD5

    337107f41e6d082a02cd9cf792a6c846

    SHA1

    47458b497fe0df09e94b4fe60a9a7b3c445a3df3

    SHA256

    060eed3b7e30d9bbd4400700953e87811bc68d1a85ea826e13bf485f7863154c

    SHA512

    2de3b4b43d1f1323c459bcb201b706ad1d50bc5528ef50c3f4d3576097c19d33127d4f67fb4bcbfa1182e5e5f84372a868136991b913134604d5c5d227e0885e

  • C:\Users\Admin\AppData\Local\Temp\uservar.ini

    Filesize

    720B

    MD5

    77983459c4dfe300fc3684541a34fa23

    SHA1

    16b45d799fb27aa3a8699d1733bcf280403132eb

    SHA256

    3ba904b8a4de897588fcb77080eb5f359380fce6e14dbc5c821a71800d179a25

    SHA512

    0fe3093f2e2c82b077e91056558d0f9559708d94c8385a17fa35c07dc55d355133ba9ac6b11eecc1c22d8a840daef179978ddc7d4c61a16ac73d6bb3e353cddb

  • C:\Users\Admin\AppData\Local\Temp\uservar.ini

    Filesize

    745B

    MD5

    c7e2a642663ad9ce6fcdcd8b7c700fb5

    SHA1

    5f0fd69427bb8f3f2a3ab07c431f6fecb0dbfa5e

    SHA256

    e23b6471322f3b515560de4a3f9ccb9d4b2f5afb6e21c0ff02daa254c00c9238

    SHA512

    176603ea885c38adf71bdb63328b27b39d63a238802d397a9172158983f9aa0ec75b3f9c8661ff2b4a00ff1debee3d60eee8fe1a339ef5757aaf6dc2114151eb

  • C:\Users\Admin\AppData\Local\Temp\uservar.ini

    Filesize

    1KB

    MD5

    d38d79d3036807402e708ca61860fb62

    SHA1

    881aebf846f2098e2c9e75e825d6d9536ebb7ec0

    SHA256

    35aab5691e816824257b3ea097d6f344eaeb710f9205a0d0e0c2dd91b74493df

    SHA512

    e5d3bd804d6c31288a7ea1b9c4fee32de444734077c4097fd62d2b190d3700b4a0aac66100eec56431ae684dd2eb8ee00b8e873654c2cd834712769151279e90

  • C:\Users\Admin\AppData\Local\Temp\uservar.ini

    Filesize

    2KB

    MD5

    2ec6b450d07ab69c1af729b43fcefafb

    SHA1

    0f127f64a9bdf5c247ab509169dcc4806a8303d1

    SHA256

    95947135ff1a92d9a54bbd1ca34cccf0cef488fe80784a9361776e29032fca1d

    SHA512

    0a855f5bb3bc74825c871b7e96a74c78f219aaaba2937c8b6e5d214cce51ac91558b17456bde0fa12a5d44739967adf512b971738580b74ad2bf769184ee6d68

  • C:\Users\Admin\AppData\Roaming\qmacro\qdisp.dll

    Filesize

    43KB

    MD5

    b83df78ade7b743ad2850702ad007819

    SHA1

    47a547638f058083c15e63dd3c8fc6d64f39a597

    SHA256

    b7b7f155fd7f5c797075b1b81472ab180426703a93eef476b181f0fd54460b39

    SHA512

    e0d90240e17b348d349d02e98266394cd46e0439c18403959bc13ca9df613f4722cee3a9a9453351e8221d8375a8ef6058f8d5327c8749cef0081127db3c7f00

  • memory/3424-30-0x0000000004410000-0x000000000441E000-memory.dmp

    Filesize

    56KB

  • memory/3424-257-0x0000000000400000-0x0000000000704000-memory.dmp

    Filesize

    3.0MB

  • memory/3424-258-0x0000000000400000-0x0000000000704000-memory.dmp

    Filesize

    3.0MB

  • memory/3424-259-0x0000000000400000-0x0000000000704000-memory.dmp

    Filesize

    3.0MB

  • memory/3424-260-0x0000000000400000-0x0000000000704000-memory.dmp

    Filesize

    3.0MB

  • memory/3424-272-0x0000000000400000-0x0000000000704000-memory.dmp

    Filesize

    3.0MB