Analysis

  • max time kernel
    141s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    26-05-2024 22:01

General

  • Target

    0625209d9c999daa22861f91f5c6f810_NeikiAnalytics.exe

  • Size

    383KB

  • MD5

    0625209d9c999daa22861f91f5c6f810

  • SHA1

    0439137d3dc9ad4f9f03fddac315ec5d69039e0a

  • SHA256

    74c34db23b9043d62022ca9725e641c655e19f2dccbdfdcebb3c242ea6e13162

  • SHA512

    c4cb56ad588cdfc06075ca21fbe470ae792f37a909fdb7b4c1ff2aac114a5e37398eb23272dbff6be014558e9c1b281fb3ee013d92ba84a9a26b48ebb0104a1c

  • SSDEEP

    6144:Cd5afqlpDHA9NtTV3okaEXnMhr1gg5YdEV1l6RXMAcfBOWq3oXY/LBFV7UMXKb3w:Cd5acTP+n25J1sJWWLBF2MXKb5Ol7

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 7 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies WinLogon 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0625209d9c999daa22861f91f5c6f810_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\0625209d9c999daa22861f91f5c6f810_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Modifies WinLogon
    • Drops file in Windows directory
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2252
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3068
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3068 -s 420
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2808

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\AppPatch\svchost.exe

    Filesize

    383KB

    MD5

    ca4df2282e35369287f0c67382025a8c

    SHA1

    070a91b8198344e28fda21daee64b1a4c00d4f12

    SHA256

    0257e094f3e4a9ae7db5111e59cde32f03bec33ced6fe5ef55cdc9eb77ec6289

    SHA512

    0bf39a2a686b2384f876cfb54f5858b0d1e03049d8cbcd12d2832941295a9319d700af99a02a180681788c0bbb327fbed8aecb7eeb1fe5b77d088926bb5e301b

  • memory/2252-17-0x0000000000400000-0x000000000049D000-memory.dmp

    Filesize

    628KB

  • memory/2252-16-0x0000000002010000-0x00000000020AD000-memory.dmp

    Filesize

    628KB

  • memory/2252-0-0x0000000000400000-0x000000000049D000-memory.dmp

    Filesize

    628KB

  • memory/3068-20-0x0000000000850000-0x00000000008FA000-memory.dmp

    Filesize

    680KB

  • memory/3068-26-0x0000000000850000-0x00000000008FA000-memory.dmp

    Filesize

    680KB

  • memory/3068-31-0x0000000000850000-0x00000000008FA000-memory.dmp

    Filesize

    680KB

  • memory/3068-24-0x0000000000850000-0x00000000008FA000-memory.dmp

    Filesize

    680KB

  • memory/3068-22-0x0000000000850000-0x00000000008FA000-memory.dmp

    Filesize

    680KB

  • memory/3068-28-0x0000000000850000-0x00000000008FA000-memory.dmp

    Filesize

    680KB

  • memory/3068-19-0x0000000000400000-0x000000000049D000-memory.dmp

    Filesize

    628KB

  • memory/3068-32-0x0000000002310000-0x00000000023C7000-memory.dmp

    Filesize

    732KB

  • memory/3068-34-0x0000000002310000-0x00000000023C7000-memory.dmp

    Filesize

    732KB

  • memory/3068-36-0x0000000002310000-0x00000000023C7000-memory.dmp

    Filesize

    732KB

  • memory/3068-43-0x0000000000400000-0x000000000049D000-memory.dmp

    Filesize

    628KB