Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 22:30
Behavioral task
behavioral1
Sample
080084c285683066d6c5b41f76b3b430_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
080084c285683066d6c5b41f76b3b430_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
080084c285683066d6c5b41f76b3b430_NeikiAnalytics.exe
-
Size
205KB
-
MD5
080084c285683066d6c5b41f76b3b430
-
SHA1
524b4631a18e977c93c474c09b32f806129d165c
-
SHA256
c4f30b93fd4341190482e6d81ac4bb149be4647dd994b0919e96c20312167004
-
SHA512
a8561a0edc32d4f5d28942cabd5b6c45b8c666bceb6a0a983e1a90f34f91894598a3c056ae5d29a6d3b4db560ac5b6ae469cd10ed118799c605b7c9df5570edd
-
SSDEEP
3072:CXkSckkHbzG1iXAt60p0zuNmnKG7peNMQbuZAItb2y3xfpT:8kSDAzG1iciuInRexuZAIvx
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
rugen.exerugen.exerugen.exepid process 2092 rugen.exe 1672 rugen.exe 1516 rugen.exe -
Loads dropped DLL 1 IoCs
Processes:
080084c285683066d6c5b41f76b3b430_NeikiAnalytics.exepid process 2244 080084c285683066d6c5b41f76b3b430_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
080084c285683066d6c5b41f76b3b430_NeikiAnalytics.exepid process 2244 080084c285683066d6c5b41f76b3b430_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 44 IoCs
Processes:
080084c285683066d6c5b41f76b3b430_NeikiAnalytics.exerugen.execmd.exetaskeng.exedescription pid process target process PID 2244 wrote to memory of 2092 2244 080084c285683066d6c5b41f76b3b430_NeikiAnalytics.exe rugen.exe PID 2244 wrote to memory of 2092 2244 080084c285683066d6c5b41f76b3b430_NeikiAnalytics.exe rugen.exe PID 2244 wrote to memory of 2092 2244 080084c285683066d6c5b41f76b3b430_NeikiAnalytics.exe rugen.exe PID 2244 wrote to memory of 2092 2244 080084c285683066d6c5b41f76b3b430_NeikiAnalytics.exe rugen.exe PID 2092 wrote to memory of 3020 2092 rugen.exe schtasks.exe PID 2092 wrote to memory of 3020 2092 rugen.exe schtasks.exe PID 2092 wrote to memory of 3020 2092 rugen.exe schtasks.exe PID 2092 wrote to memory of 3020 2092 rugen.exe schtasks.exe PID 2092 wrote to memory of 2232 2092 rugen.exe cmd.exe PID 2092 wrote to memory of 2232 2092 rugen.exe cmd.exe PID 2092 wrote to memory of 2232 2092 rugen.exe cmd.exe PID 2092 wrote to memory of 2232 2092 rugen.exe cmd.exe PID 2232 wrote to memory of 2772 2232 cmd.exe cmd.exe PID 2232 wrote to memory of 2772 2232 cmd.exe cmd.exe PID 2232 wrote to memory of 2772 2232 cmd.exe cmd.exe PID 2232 wrote to memory of 2772 2232 cmd.exe cmd.exe PID 2232 wrote to memory of 2788 2232 cmd.exe cacls.exe PID 2232 wrote to memory of 2788 2232 cmd.exe cacls.exe PID 2232 wrote to memory of 2788 2232 cmd.exe cacls.exe PID 2232 wrote to memory of 2788 2232 cmd.exe cacls.exe PID 2232 wrote to memory of 2876 2232 cmd.exe cacls.exe PID 2232 wrote to memory of 2876 2232 cmd.exe cacls.exe PID 2232 wrote to memory of 2876 2232 cmd.exe cacls.exe PID 2232 wrote to memory of 2876 2232 cmd.exe cacls.exe PID 2232 wrote to memory of 2672 2232 cmd.exe cmd.exe PID 2232 wrote to memory of 2672 2232 cmd.exe cmd.exe PID 2232 wrote to memory of 2672 2232 cmd.exe cmd.exe PID 2232 wrote to memory of 2672 2232 cmd.exe cmd.exe PID 2232 wrote to memory of 2640 2232 cmd.exe cacls.exe PID 2232 wrote to memory of 2640 2232 cmd.exe cacls.exe PID 2232 wrote to memory of 2640 2232 cmd.exe cacls.exe PID 2232 wrote to memory of 2640 2232 cmd.exe cacls.exe PID 2232 wrote to memory of 1148 2232 cmd.exe cacls.exe PID 2232 wrote to memory of 1148 2232 cmd.exe cacls.exe PID 2232 wrote to memory of 1148 2232 cmd.exe cacls.exe PID 2232 wrote to memory of 1148 2232 cmd.exe cacls.exe PID 2404 wrote to memory of 1672 2404 taskeng.exe rugen.exe PID 2404 wrote to memory of 1672 2404 taskeng.exe rugen.exe PID 2404 wrote to memory of 1672 2404 taskeng.exe rugen.exe PID 2404 wrote to memory of 1672 2404 taskeng.exe rugen.exe PID 2404 wrote to memory of 1516 2404 taskeng.exe rugen.exe PID 2404 wrote to memory of 1516 2404 taskeng.exe rugen.exe PID 2404 wrote to memory of 1516 2404 taskeng.exe rugen.exe PID 2404 wrote to memory of 1516 2404 taskeng.exe rugen.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\080084c285683066d6c5b41f76b3b430_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\080084c285683066d6c5b41f76b3b430_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rugen.exe /TR "C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe" /F3⤵
- Creates scheduled task(s)
PID:3020
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "rugen.exe" /P "Admin:N"&&CACLS "rugen.exe" /P "Admin:R" /E&&echo Y|CACLS "..\200f691d32" /P "Admin:N"&&CACLS "..\200f691d32" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:2772
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:N"4⤵PID:2788
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "rugen.exe" /P "Admin:R" /E4⤵PID:2876
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:2672
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:N"4⤵PID:2640
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\200f691d32" /P "Admin:R" /E4⤵PID:1148
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {3CB6B19F-A538-4F1A-8A60-20AF33865343} S-1-5-21-2737914667-933161113-3798636211-1000:PUMARTNR\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe2⤵
- Executes dropped EXE
PID:1672
-
-
C:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exeC:\Users\Admin\AppData\Local\Temp\200f691d32\rugen.exe2⤵
- Executes dropped EXE
PID:1516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD5080084c285683066d6c5b41f76b3b430
SHA1524b4631a18e977c93c474c09b32f806129d165c
SHA256c4f30b93fd4341190482e6d81ac4bb149be4647dd994b0919e96c20312167004
SHA512a8561a0edc32d4f5d28942cabd5b6c45b8c666bceb6a0a983e1a90f34f91894598a3c056ae5d29a6d3b4db560ac5b6ae469cd10ed118799c605b7c9df5570edd