Analysis

  • max time kernel
    149s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-05-2024 06:49

General

  • Target

    f32311593d5a1f714570a7b91d9100e0_NeikiAnalytics.exe

  • Size

    455KB

  • MD5

    f32311593d5a1f714570a7b91d9100e0

  • SHA1

    c343c18f3f208cf7719550fa4aaec1d77840e7da

  • SHA256

    d87963dfe40f497ee7d3d94e57cd5738ecc61f3cf843873133a6cbddb0a7b359

  • SHA512

    794b86df535b509b2bc442fb04475b8a113f7e568e8c9b5d9ffaa54ca7b9a71db84af163189ddd75175be84214571355bdd21becffc2b3c3b909a22ba10e6b5c

  • SSDEEP

    12288:WVEue/UNolyeWYB0kGZFdLagJdF0S/xPaG9:WVEuegLagJdF0S5PaG9

Malware Config

Signatures

  • Renames multiple (220) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops file in Drivers directory 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3464
      • C:\Users\Admin\AppData\Local\Temp\f32311593d5a1f714570a7b91d9100e0_NeikiAnalytics.exe
        "C:\Users\Admin\AppData\Local\Temp\f32311593d5a1f714570a7b91d9100e0_NeikiAnalytics.exe"
        2⤵
        • Drops file in Drivers directory
        • Adds Run key to start application
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1956
        • C:\Windows\SysWOW64\net.exe
          net stop "Kingsoft AntiVirus Service"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4628
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
            4⤵
              PID:1620
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a4779.bat
            3⤵
              PID:2532
              • C:\Users\Admin\AppData\Local\Temp\f32311593d5a1f714570a7b91d9100e0_NeikiAnalytics.exe
                "C:\Users\Admin\AppData\Local\Temp\f32311593d5a1f714570a7b91d9100e0_NeikiAnalytics.exe"
                4⤵
                • Executes dropped EXE
                PID:4600
            • C:\Windows\Logo1_.exe
              C:\Windows\Logo1_.exe
              3⤵
              • Drops file in Drivers directory
              • Executes dropped EXE
              • Adds Run key to start application
              • Enumerates connected drives
              • Drops file in Program Files directory
              • Drops file in Windows directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:1596
              • C:\Windows\SysWOW64\net.exe
                net stop "Kingsoft AntiVirus Service"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:3856
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                  5⤵
                    PID:644
                • C:\Windows\SysWOW64\net.exe
                  net stop "Kingsoft AntiVirus Service"
                  4⤵
                  • Suspicious use of WriteProcessMemory
                  PID:548
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
                    5⤵
                      PID:4636

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files\7-Zip\7z.exe.Exe
              Filesize

              607KB

              MD5

              265b379478ad9643a25c5f8ceb0b5f45

              SHA1

              3dcc9a1323a98cca54def6963dbb7f81b8c9f12f

              SHA256

              1a07a8056a490f505eec70867306ed6a8ce8b454b287d33aa73ebeb04b70b30d

              SHA512

              6385bd33f208d49a358fdba79b1a12f1e379b40fc8a061db03e9bfe24304fcc7624ec0c91502341f2b6a91f74afb5d50c7c0673a9b35dc7dc26fdaab6095e02e

            • C:\Users\Admin\AppData\Local\Temp\$$a4779.bat
              Filesize

              620B

              MD5

              064c3dff4c006bfd4fb4ba69a7fa60d7

              SHA1

              84d3376a27f761f24f58d21eda9dd1cfa433eb1f

              SHA256

              c54bb149269f358a46663947b92f685c9956cbfa7fcc3f97be2a14485acb212a

              SHA512

              1c48b00dec5c56ebd58dd4ba1170b83cc6eedc7dad78bb0d1917079e6237b5d74523519417987f6c7ca6466942603a2470087fa8e8e3debfbec6e6badd8e106b

            • C:\Users\Admin\AppData\Local\Temp\f32311593d5a1f714570a7b91d9100e0_NeikiAnalytics.exe.exe
              Filesize

              392KB

              MD5

              3b08ea93371567d3fa50aa278f1e3709

              SHA1

              82adf83bb42b403de1ff5a151e4c9dbe3b2c1a00

              SHA256

              de9ef168605c01a9e684fe35e0eae916d5d6cb1d07036ed434876e2da47c684d

              SHA512

              63a80d2dc056363991fe6bd77ef936a5d6c15c7ef8f2cf92c1e98525aec0714a5b83d1e830b33e8e4290ba97edc2c1ed57982be3360ff47c6d578a06c6264de7

            • C:\Windows\Logo1_.exe
              Filesize

              63KB

              MD5

              8c8df5b9b78e8bff5d26257de8ef0c8d

              SHA1

              a947ee766bbb79cca23cc90341e8987ba1020f30

              SHA256

              fb4f742e543a646890ec49fab3064cdd9a896592df52b8dc37ead4851832593f

              SHA512

              7ed132de1a9d8425633c70e6956a4b19084bb18518d3a80044cfc2a48c4a4c9bf6dba1029032f9c82c096f5f7ce01ca2492412829e06d84c7c63ea7a6fbcbea7

            • C:\Windows\system32\drivers\etc\hosts
              Filesize

              842B

              MD5

              6f4adf207ef402d9ef40c6aa52ffd245

              SHA1

              4b05b495619c643f02e278dede8f5b1392555a57

              SHA256

              d9704dab05e988be3e5e7b7c020bb9814906d11bb9c31ad80d4ed1316f6bc94e

              SHA512

              a6306bd200a26ea78192ae5b00cc49cfab3fba025fe7233709a4e62db0f9ed60030dce22b34afe57aad86a098c9a8c44e080cedc43227cb87ef4690baec35b47

            • memory/1596-10-0x0000000000400000-0x000000000043F000-memory.dmp
              Filesize

              252KB

            • memory/1596-18-0x0000000000510000-0x0000000000550000-memory.dmp
              Filesize

              256KB

            • memory/1596-22-0x0000000000400000-0x000000000043F000-memory.dmp
              Filesize

              252KB

            • memory/1596-23-0x0000000000510000-0x0000000000550000-memory.dmp
              Filesize

              256KB

            • memory/1956-11-0x0000000000400000-0x000000000043F000-memory.dmp
              Filesize

              252KB

            • memory/1956-0-0x0000000000400000-0x000000000043F000-memory.dmp
              Filesize

              252KB

            • memory/1956-1-0x0000000000510000-0x0000000000530000-memory.dmp
              Filesize

              128KB

            • memory/4600-16-0x0000000000400000-0x0000000000462000-memory.dmp
              Filesize

              392KB