Analysis

  • max time kernel
    140s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    26-05-2024 21:43

General

  • Target

    04d03e477f0a6602769182acc1dd8dc0_NeikiAnalytics.exe

  • Size

    260KB

  • MD5

    04d03e477f0a6602769182acc1dd8dc0

  • SHA1

    7fa1bc03c0cdfa3d1697e3ad55dd0254b0e96537

  • SHA256

    62a1bdc27ddca35b0e1e540b0a3aa57f1ebf4b89bb9c99770dac19a9549a8c32

  • SHA512

    a992be15386f9cc87677d12b4184e575728f9b9299daa9a21f21ef7d6dfb62bc83f2d81fd79545ab968f5599652dcc853b77a26102e15a407c333ac21526b95f

  • SSDEEP

    6144:uf4/sJYWEbhtwaBV5ZFDQH7i6aEaS/vsd9YoeVjy:uf4QlGD3BV5ZFDfSRsd9YRBy

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Program Files directory 4 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\04d03e477f0a6602769182acc1dd8dc0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\04d03e477f0a6602769182acc1dd8dc0_NeikiAnalytics.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2404
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c ping 127.0.0.1 -n 2&C:\Users\Admin\AppData\Local\Temp\\zoutchkgv.exe "C:\Users\Admin\AppData\Local\Temp\04d03e477f0a6602769182acc1dd8dc0_NeikiAnalytics.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2180
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1 -n 2
        3⤵
        • Runs ping.exe
        PID:1712
      • C:\Users\Admin\AppData\Local\Temp\zoutchkgv.exe
        C:\Users\Admin\AppData\Local\Temp\\zoutchkgv.exe "C:\Users\Admin\AppData\Local\Temp\04d03e477f0a6602769182acc1dd8dc0_NeikiAnalytics.exe"
        3⤵
        • Deletes itself
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1968
        • \??\c:\Program Files\tjegc\goqkon.exe
          "c:\Program Files\tjegc\goqkon.exe" "c:\Program Files\tjegc\goqkon.dll",Cache C:\Users\Admin\AppData\Local\Temp\zoutchkgv.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Enumerates connected drives
          • Writes to the Master Boot Record (MBR)
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2676

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\zoutchkgv.exe

    Filesize

    260KB

    MD5

    689141c886d8ae8c460adf4300eabb64

    SHA1

    2416ebc1b97bc1d14084643a77bb6a5c0f60c2d6

    SHA256

    eaa7ec7c90b2eaceaecf188728ea62143304494d84bbf6f86a0728d165c9f8b7

    SHA512

    4293587b14b59b989fd7715050d2327702427a97742bd7b703119992920c323dd4a23b303b2233f709e6f80074978ec4d7c9b5ca813d2059dfe0eddb0cfb6cc5

  • \??\c:\Program Files\tjegc\goqkon.dll

    Filesize

    188KB

    MD5

    1e63f3d38a243280e4763044ceaa645a

    SHA1

    ac35f3605433c68fcd488157463171504bb863f9

    SHA256

    c27b2a23a512fc3ef41d4f5147246abe3f830f9d42ca9eef18d7def489d28ce0

    SHA512

    ccfefff38611b4013843e5540a1ade6cafdad0541a63b85a1be64676c8a56ea425825adbf95d1d2fa37d646c53493a531897e1fd44887367b99c306d14bbe59f

  • \Program Files\tjegc\goqkon.exe

    Filesize

    43KB

    MD5

    51138beea3e2c21ec44d0932c71762a8

    SHA1

    8939cf35447b22dd2c6e6f443446acc1bf986d58

    SHA256

    5ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124

    SHA512

    794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d

  • memory/1968-9-0x0000000000400000-0x000000000048C050-memory.dmp

    Filesize

    560KB

  • memory/1968-16-0x0000000000400000-0x000000000048C050-memory.dmp

    Filesize

    560KB

  • memory/2180-8-0x0000000000400000-0x000000000048D000-memory.dmp

    Filesize

    564KB

  • memory/2180-7-0x0000000000400000-0x000000000048D000-memory.dmp

    Filesize

    564KB

  • memory/2404-0-0x0000000000400000-0x000000000048C050-memory.dmp

    Filesize

    560KB

  • memory/2404-2-0x0000000000400000-0x000000000048C050-memory.dmp

    Filesize

    560KB

  • memory/2676-23-0x0000000010000000-0x000000001006F000-memory.dmp

    Filesize

    444KB

  • memory/2676-24-0x0000000010000000-0x000000001006F000-memory.dmp

    Filesize

    444KB

  • memory/2676-26-0x0000000010000000-0x000000001006F000-memory.dmp

    Filesize

    444KB