Analysis

  • max time kernel
    126s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    26-05-2024 02:12

General

  • Target

    505fab8c9ad2cf60720b7e182b3b26f0_NeikiAnalytics.exe

  • Size

    5.9MB

  • MD5

    505fab8c9ad2cf60720b7e182b3b26f0

  • SHA1

    5a33e83861c1cf6dc4d88e32b8b266c6c973bbf4

  • SHA256

    073bb9f73c99a25206c34ec9f849fbed54c5645ff59588096c678ad0c7bbf16b

  • SHA512

    e0b71b2f15a666eceff0a4e9f739d64239a76e88d32e57c52ead8123b6ef6b23caa7529863639a448c19d38e50b2d124b172da62ab496794c4e1a26923c3b263

  • SSDEEP

    98304:UY+uAH655bmZ2Ixu+FIFPQ25UTzLrJGEnP77qt4Qj3QubzAT66qiT3GRmYugmJtA:OQ5Z+F8Pr2PJvnqmU/bH702MVgmNRs

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 14 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 9 IoCs
  • Program crash 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\505fab8c9ad2cf60720b7e182b3b26f0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\505fab8c9ad2cf60720b7e182b3b26f0_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2164
    • \??\c:\users\admin\appdata\local\temp\wmpscfgs.exe
      c:\users\admin\appdata\local\temp\\wmpscfgs.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:848
      • \??\c:\users\admin\appdata\local\temp\wmpscfgs.exe
        c:\users\admin\appdata\local\temp\\wmpscfgs.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:856
      • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
        C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2020
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2020 -s 88
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:1420
    • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
      C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2728
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 88
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2664
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2828
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2828 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1908
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2828 CREDAT:1586180 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1496

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5bea5fa47c653b50488d432c8a12b56a

    SHA1

    0594b295488a5fdc7bf15139613f904e5fb49ba1

    SHA256

    31e59f88beae68942ab270a8fa8d0610ff31c85c6cbc45ab382f3eb2adf22ed2

    SHA512

    90d5b9bae6598c139f7a193e471e7a3eee8867d7d8e393c9423b9e8986a29fb04584f492ba93cb77f5430a76e0127eaaa1d7a176153b6ea97e3f212e81784312

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ab852397a3bbd1798df2c080442d7a79

    SHA1

    72e973789b0650be4435ae5a04e5c9cf9d9aa8b3

    SHA256

    7488937bfcb9f25799c26318e5021bf5bbb76863bc3d80a55fb2208e0036bfbf

    SHA512

    b6f65e029a960ecd0dbbc07ac3c534bf27f43bceafec89cb9445b26cdd4da252d4ab7929659bd1d6e0218d1fb91af3632d455144cc6cbea337ee94f539707bdf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d529257a69bc49b09613bdc8a178834c

    SHA1

    092bd1ca768b8b5b47c37bc9d6cd5f7027799311

    SHA256

    b9307decfb35e0b424e691b47ed596ee31194b2dfc2c75946f646691edd40629

    SHA512

    397c5920bd86bb2e5f3ab9c2b0a3d4e262774290c7220f171df811224539ace49873a419cc9f6cf1fa7991c86533ae80315d228b185473e0decf030c4b54f354

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    08e9fde4204b152d486bfb7d45532821

    SHA1

    2a2110946143554ea5fd15922434d6ed7e742d9e

    SHA256

    1d6a48d2d161874b171ac98ba870bacc75db7ae83f3f9fb29378009dceae1bb0

    SHA512

    04c25f38f313dd939405481fa921921e02b0de799195ed5254cd7eb5e8a963ca73bdce8c9d5ab9cf653b56761c3f108c1b511d278014fbd03c38be44476af376

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4bfad7adde7fde857816914b0e96dba6

    SHA1

    f454828568f55284c5805b3463b2282d44ae1985

    SHA256

    96201fa03743eebff46d6044976c64275e323bf768668c905b45af1b72d9f72d

    SHA512

    b717f654e26db46f118fefc41e8ad92cec60b40e09256dd25f91705c1381184c5f3156c4993a04bc8aeaf1219e954299d354b9b999c2269fff972689bb3b71ef

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    42cd4023cae3111d88a70e6e8bf84179

    SHA1

    088f64095991cdac99e486fd6c47f6d538f060bc

    SHA256

    92041b42403339f32f2828889cde6409251deb155b71458218d60559288f182d

    SHA512

    d1768b5a2586664fc75a3d211a844a95daac62c2329391a2807082554c5fedb8e81df852f00a791b79fb76bd427ea7c460f1b4feec41fbedabdf3c04278c2ffd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    db6ddea0f3ad48ea192650439e480dac

    SHA1

    97b5a9f6238ae630870e0d3910d42531c4c16378

    SHA256

    e4f59a68b69d7ecfe2c5c835c57a937a6f50fdce5a5ee77796ffd797efaa4997

    SHA512

    ee062c72e0eb27655abe76a17b0d19109855bb02959a72abbae61260da8685209ec7fa43178e536e6461eaf0a8f6d462af4275b6cb2f341e38cb4c3ab600403b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    6d309709100b6c17cff645d63ab51ca6

    SHA1

    ad3257a0e955ffaeda4902a745d038f9ea5b6f1e

    SHA256

    ab46c8c519326870be514c773089b7a958f54ceded4b3b26ac41a1d0ba5e65c7

    SHA512

    316adf3fc82beca3e0096b720d93b267fd30fa08e83d46efe4fce2eaeae39439ee9545b4d9a2447e215e1ac919dd398153cf72a004d70154c789bda275e21ab5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3ed0b4caba79cb8ed8bfc2542642f4a8

    SHA1

    ad262abe2dc82c29720dfb1c58a04a297ebeed46

    SHA256

    d39c246f6a7878398399be43578ca6272cef4565460eaf004eed2b88b4a81d65

    SHA512

    135a2f0856b4a5aaf30efabf8c7c616757205a604a4ea6ba69396ca09cf6cf513a47f9ee7227bad9e0904cb8c79a191f2e87f84f8c5a5d054235263dd49ff3bb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a4fd9de41fb5b420d49b2dae575581eb

    SHA1

    3fd7999309a673b0a8a04185dcd95d9037091039

    SHA256

    4555aef6cf6a72d9444dc0208e7a8aec3aabf4c81b2154e4ab7ab716612bdb7b

    SHA512

    befcd08e8adec862e5710d14478f43f2abc7f454ffdd5785353eec6dcd4485f19ba7001363821502d37ff3301b10f70adf4ee407cab7d0d6a0333977d71ce515

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    1d2642fab16ec36c1c47e46691fa0f2e

    SHA1

    6b1acb43d5dc214c6b21fab11cbeadbe8ede61b5

    SHA256

    89df7247f31091af90d2c033a42df8d125d4e23b24ee1dc7a3c5ec26b812a3e6

    SHA512

    05ff3abdee521638e05298891e52f36fd414cf6e457e77216be57f3f97cc3ae2870730e4484ecdd830bd6fec3dbc0f74552053e84d4b2de12d01a7ffb4671afd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3658b4dd971b35a025764778b479ea72

    SHA1

    53a22cf46fecaa015f265cb6e5c2f826ce7c0000

    SHA256

    cba6b3935e2517f3b08a631484a88154943c58da30dd2e638c466994edb72586

    SHA512

    e5493e54db879824332e13d43a153c202cb34e98ed48fcfabb820912af51845170f8c79ae1479d876b1f585325ee949f641e5c53be84987bbfa7e4ab441b688e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d4cc130605a3aecb9a7c935e960dfa03

    SHA1

    d8f8764aa166aafe9f6dbe18c52f19b8ee296ad1

    SHA256

    2762593cea0dcecc5f7cada044e61707d0cef8edeb7c0c8279afed805dc02d5b

    SHA512

    4b991cc7daed086c4c15ee3293bc33ff8b861884b93f33c8457ac6c5e44479e69e029cc9d88a8633b2545e2884fe7cf65ab05a1d43d048eadcca5922fcb25037

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ca81b2dc2f4500304ba882377418918c

    SHA1

    1ef2f4e63a6b004db32efeac4924468da6ff8dfa

    SHA256

    3f564ef3bd55d7d1911e6d821be5bb11491168851ad5b4913010d2e9d3fced7c

    SHA512

    6345cfcb428b78f07ab9242741e13de56b1c319b00944273faf3db6af1e4d451131cee86e9ee5c94dc34f37f623896a53b6aa390faa61beb01c0d0754c1d6094

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c5dcac4226a50e37f33c3cc2040bafc8

    SHA1

    8f74192ed30e9be5b273aef00072e3c7c8000b49

    SHA256

    ef1bbcd682a09150f742cc602bba0231c9620c51fd4f001299e67ddb299c960c

    SHA512

    6f13d88f34f1e595c893d947447345e3bc1807f3e1d41a44501d6559148f8ace5df2fe0e7c7758519e8ae01a55d368b035bc4b8f6631ae82f0c07dd059d666d0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a240aa24dabc40e6ea196979f0cd323f

    SHA1

    b40af1342973a5cfbff74fda60efe8682935e30e

    SHA256

    f5e42519d0267bae6ff3b902604620fbc5ca0cabf72005199ecdd29668e8a632

    SHA512

    68797c8deb074ebbbe7b391a10dc7183df75c81928cafa282584b0efb42370dbf1509f64ffaf8ef628666be75ed4e72eeb1e1d838974e2f73a54d5d4bc3bfe74

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f64b373a2aab307ff3b4a42e8db2a15f

    SHA1

    a792c5c74d2e93cff3aa13841e59ba2c72c33fde

    SHA256

    5f02187efaae87a2cf0be81d62ec6cb27dc3adcc5bf37d1eef51c34dd837d641

    SHA512

    f9e8e07cf93269947042a0b450b377d512879ea25be39941ceb5e1c1732046b6b1b62918a7cebaad03eb78d3c0d1889182e0db7625dfdad6999fa00a0f2cdfb8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8cfc508644897f9ae6a2dc6801e13a04

    SHA1

    40a1172e201f4c702c5d26752a4b3473789b57e7

    SHA256

    a4439a91876997de9a44dd7bd855d5d4fd8877887641d173d7d1a0b6f5b7d9da

    SHA512

    dfd70e52f1a558089b3eab5611639dd2f98a78fee0854aeef996fb5e697af1a4c156f0303d3a5d4b066dc35eb03a25d5cc5e166ff8384ab27147986d0c1bcb55

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MNCIS1YI\brBaslEal[1].js

    Filesize

    32KB

    MD5

    f48baec69cc4dc0852d118259eff2d56

    SHA1

    e64c6e4423421da5b35700154810cb67160bc32b

    SHA256

    463d99ca5448f815a05b2d946ddae9eed3e21c335c0f4cfe7a16944e3512f76c

    SHA512

    06fdccb5d9536ab7c68355dbf49ac02ebccad5a4ea01cb62200fd67728a6d05c276403e588a5bdceacf5e671913fc65b63e8b92456ca5493dae5b5a70e4a8b37

  • C:\Users\Admin\AppData\Local\Temp\Cab8CF7.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar8D38.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Users\Admin\AppData\Local\Temp\wmpscfgs.exe

    Filesize

    5.9MB

    MD5

    b85708882837ef26183cf0ee740ab8bf

    SHA1

    9672afc5fe2a3af2655d06432cd0762bdecf9d2d

    SHA256

    7b90dd12a7defaa8b24978b61e36d698369ed1f608caedc85c7ab6d917ab1cf2

    SHA512

    d1c1a5fccc688f7ec38e3c6c92cdd36047032ec8c4ca773c06357927a90713c7e41afd69e21b78a1517a13bda8d161ea3abcabde7ddd92259c0e9c27d95fd2f5

  • \??\c:\program files (x86)\microsoft office\office14\bcssync.exe

    Filesize

    5.9MB

    MD5

    0b34a0855d9be9ed8d3a4237d72c2424

    SHA1

    b8370711d39db810f68f7ba951d65a312aa07084

    SHA256

    dd52f0cc445a58b6078d088ac383af6f4a4fb4fe97432e558317a3b5542fd6e0

    SHA512

    742a018f4464df13dc5843f7b192645339de9ba4b7f242b434e940401b2dc5077e2f39a3e75828360c9db7df13c500b1efaa3b80ba21461fd3da39fb6a858ee8

  • \Program Files (x86)\Internet Explorer\wmpscfgs.exe

    Filesize

    5.9MB

    MD5

    1f208e5145db36002892f2a480a6791c

    SHA1

    2b56f7851f2fc737fedb9c879849dcd8e0a5a07e

    SHA256

    835ad6beda3250ddeb6269709551b0ab3639b6153cd7c82fa29f89224576fe33

    SHA512

    0f12b176cce7ea546d5742ad47593f601549f577566605dac40036280008b527bd1c460d1b81556c0027a24da63c237650b32cf4f7118cf05348bd8e1131ceae

  • memory/848-88-0x0000000000260000-0x0000000000262000-memory.dmp

    Filesize

    8KB

  • memory/848-59-0x0000000000400000-0x0000000000CB4000-memory.dmp

    Filesize

    8.7MB

  • memory/848-51-0x0000000010000000-0x0000000010010000-memory.dmp

    Filesize

    64KB

  • memory/848-42-0x0000000000400000-0x0000000000CB4000-memory.dmp

    Filesize

    8.7MB

  • memory/848-40-0x0000000000400000-0x0000000000CB4000-memory.dmp

    Filesize

    8.7MB

  • memory/856-85-0x0000000000400000-0x0000000000CB4000-memory.dmp

    Filesize

    8.7MB

  • memory/2020-86-0x0000000000400000-0x0000000000CB4000-memory.dmp

    Filesize

    8.7MB

  • memory/2164-8-0x0000000000400000-0x0000000000CB4000-memory.dmp

    Filesize

    8.7MB

  • memory/2164-9-0x0000000010000000-0x0000000010010000-memory.dmp

    Filesize

    64KB

  • memory/2164-0-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/2164-5-0x0000000000400000-0x0000000000CB4000-memory.dmp

    Filesize

    8.7MB

  • memory/2164-7-0x0000000000422000-0x0000000000728000-memory.dmp

    Filesize

    3.0MB

  • memory/2164-34-0x0000000000400000-0x0000000000CB4000-memory.dmp

    Filesize

    8.7MB

  • memory/2164-2-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/2164-32-0x0000000000422000-0x0000000000728000-memory.dmp

    Filesize

    3.0MB

  • memory/2164-4-0x00000000001B0000-0x00000000001B1000-memory.dmp

    Filesize

    4KB

  • memory/2728-106-0x0000000000400000-0x0000000000CB4000-memory.dmp

    Filesize

    8.7MB

  • memory/2728-47-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2728-48-0x0000000000400000-0x0000000000CB4000-memory.dmp

    Filesize

    8.7MB

  • memory/2728-45-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2728-50-0x0000000000400000-0x0000000000CB4000-memory.dmp

    Filesize

    8.7MB