Analysis
-
max time kernel
147s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 04:58
Static task
static1
Behavioral task
behavioral1
Sample
6b500846eacd59046fa9c79fce718770_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
6b500846eacd59046fa9c79fce718770_NeikiAnalytics.exe
-
Size
6.5MB
-
MD5
6b500846eacd59046fa9c79fce718770
-
SHA1
357713319a8d77551edb23c85a29fd881cf29339
-
SHA256
144113097b9b329d148501a7be994c4e4b2eb0c5f8aa197e5e58b99f7154293b
-
SHA512
3b3f2b33181c64be3976815fdf84396e037773c0b470482866496d5a08e576cbf3551c337bceca9d74e73e7bae79ba68d6ac274b2e59c04f1c8dddbb4560a3c7
-
SSDEEP
98304:Roc5swrA2XGxlHKcjTjNk3o659yrnfKtDrKIAyyks+Ctf8mQZVSv:i0LrA2kHKQHNk3og9unipQyOaOv
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Deletes itself 1 IoCs
pid Process 2600 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 2968 onwyx.exe 1436 lumatu.exe 3024 riduj.exe -
Loads dropped DLL 5 IoCs
pid Process 1932 6b500846eacd59046fa9c79fce718770_NeikiAnalytics.exe 1932 6b500846eacd59046fa9c79fce718770_NeikiAnalytics.exe 2968 onwyx.exe 2968 onwyx.exe 1436 lumatu.exe -
resource yara_rule behavioral1/files/0x0009000000015f54-155.dat upx behavioral1/memory/3024-168-0x0000000000400000-0x0000000000599000-memory.dmp upx behavioral1/memory/1436-159-0x0000000004C30000-0x0000000004DC9000-memory.dmp upx behavioral1/memory/3024-174-0x0000000000400000-0x0000000000599000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 1932 6b500846eacd59046fa9c79fce718770_NeikiAnalytics.exe 2968 onwyx.exe 1436 lumatu.exe 3024 riduj.exe 3024 riduj.exe 3024 riduj.exe 3024 riduj.exe 3024 riduj.exe 3024 riduj.exe 3024 riduj.exe 3024 riduj.exe 3024 riduj.exe 3024 riduj.exe 3024 riduj.exe 3024 riduj.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1932 wrote to memory of 2968 1932 6b500846eacd59046fa9c79fce718770_NeikiAnalytics.exe 28 PID 1932 wrote to memory of 2968 1932 6b500846eacd59046fa9c79fce718770_NeikiAnalytics.exe 28 PID 1932 wrote to memory of 2968 1932 6b500846eacd59046fa9c79fce718770_NeikiAnalytics.exe 28 PID 1932 wrote to memory of 2968 1932 6b500846eacd59046fa9c79fce718770_NeikiAnalytics.exe 28 PID 1932 wrote to memory of 2600 1932 6b500846eacd59046fa9c79fce718770_NeikiAnalytics.exe 29 PID 1932 wrote to memory of 2600 1932 6b500846eacd59046fa9c79fce718770_NeikiAnalytics.exe 29 PID 1932 wrote to memory of 2600 1932 6b500846eacd59046fa9c79fce718770_NeikiAnalytics.exe 29 PID 1932 wrote to memory of 2600 1932 6b500846eacd59046fa9c79fce718770_NeikiAnalytics.exe 29 PID 2968 wrote to memory of 1436 2968 onwyx.exe 31 PID 2968 wrote to memory of 1436 2968 onwyx.exe 31 PID 2968 wrote to memory of 1436 2968 onwyx.exe 31 PID 2968 wrote to memory of 1436 2968 onwyx.exe 31 PID 1436 wrote to memory of 3024 1436 lumatu.exe 34 PID 1436 wrote to memory of 3024 1436 lumatu.exe 34 PID 1436 wrote to memory of 3024 1436 lumatu.exe 34 PID 1436 wrote to memory of 3024 1436 lumatu.exe 34 PID 1436 wrote to memory of 2840 1436 lumatu.exe 35 PID 1436 wrote to memory of 2840 1436 lumatu.exe 35 PID 1436 wrote to memory of 2840 1436 lumatu.exe 35 PID 1436 wrote to memory of 2840 1436 lumatu.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b500846eacd59046fa9c79fce718770_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\6b500846eacd59046fa9c79fce718770_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\onwyx.exe"C:\Users\Admin\AppData\Local\Temp\onwyx.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\lumatu.exe"C:\Users\Admin\AppData\Local\Temp\lumatu.exe" OK3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\riduj.exe"C:\Users\Admin\AppData\Local\Temp\riduj.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3024
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵PID:2840
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- Deletes itself
PID:2600
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224B
MD526f7ceb2e823c9354c157c00b7fa662b
SHA16ad9dfaedfcb228fef9dd7bcf137cd6b0c1fd8c1
SHA256cdd2e73f8cb4dc224ec0d1253a4c21cd69bcab4f8e6a1524d76bc348f21b7622
SHA5129f447c4b2a52feac280ab8fa4b4bc59e0b801c342b1345ede935f92dda95a272859b4b412c73fb5bab085ea2ee517400ef88bbdf59e437bef4a39f303dc1825a
-
Filesize
306B
MD52193a22d168154bb12911bfa33c6bb83
SHA11ac62a4a250c99af18c692f423292f97c86e86f8
SHA256026c08121b9fd2bc71f790cc9b49c2e50bb0522ccf3fc9d6c823fa50b5dff8d2
SHA512f4953ec27a8ae2005d8bfd3f607e498a13b654672b369ddb46e87f4e2af423cf3a4f25e950c96ad5a1554fd130830c8ba40a8b105cb34d8570e675db1f626186
-
Filesize
104B
MD5dbef593bccc2049f860f718cd6fec321
SHA1e7e9f8235b4eb70aa99dd2c38009f2152575a8d0
SHA25630f820bb1ca6c20bcd77113c7377e01f31cdf0ec5b64864f22887d41a9bf3c7a
SHA5123e87c661c343b72f5dff4587b99688dbf655be9d6d903a75151bd9f204f55858e90388591f660bcbded5278ef94e322bf3e7c57374c9b16fce1eef7082395a2a
-
Filesize
512B
MD56d3aabbf795f50e96dfb0d6eabe6a038
SHA1f8c464211dbf4412ee3a5b4dd504eac1a4b2ee70
SHA25610607f0acb791ab99ba1f0e5752bd9703f588cd9c20c7b36e26818c3c164d492
SHA512187fb27934768bd80ba735eec7dc7e56d65f6b1ebeaf7dbc965373d8044bd5f90654c71e6fbbbde94348c33d0ff98297a89aa06a1c2d488fd637a075dde2de70
-
Filesize
6.5MB
MD5e9eb5ae44d6aa8a34c91a8bb5d3551e8
SHA164972bb42cdc7f775f58ea8d42be5aa64ac2c1b2
SHA2560c102d3f62d85b7726967652ab1cc57b4a84867f447cf81900781eaac058dfff
SHA512492c835e89ba0cc8a16b1f756e01fa90f3c3008e27699edad08e572d82fd14533aad868b723c647fe3a3e69de17b424cab0f087cee6ce0b505a089df781864f4
-
Filesize
459KB
MD53ee372e9696e4174716a6b304b6b783c
SHA1122a202973a0fd6297378f769bab4c681d62f0e2
SHA256cc1fed1a3494afaf70ddfc8bb9dbbedd1f19fc48b74b4796dcfed958dc32c665
SHA512c93ac06a2fccd161d9a16212cab13af72f936a616b7d5a1a1c26ebffca765263334cd5fd547d59cdafef6b36a7305e39f5029a52b22c275fac4cfc9b37b1723d