Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 04:38
Static task
static1
Behavioral task
behavioral1
Sample
32c8c18695345c5cb012259b26e44dd0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
32c8c18695345c5cb012259b26e44dd0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
32c8c18695345c5cb012259b26e44dd0_NeikiAnalytics.exe
-
Size
224KB
-
MD5
32c8c18695345c5cb012259b26e44dd0
-
SHA1
dd29a982c0dc3a3114970817646eaa5fd10df33a
-
SHA256
c9a958b9fe553ef0140df0f0176e608d6335a4dd283ae8761bb27065fd7ac8d9
-
SHA512
1757209dd2adc435bb9aa7f176591f8ac7c4f6d5f86cf1796af83cc51c1b229b9457e05c0add4917f6aa49c737aa4e48d5c661d21bdb2272b3bfb8b6d0e7651f
-
SSDEEP
3072:TKC7MKza/YnXbvr+yNEjGS8isZ4HukP8YVqsZVcDvOmzn1aDGrXI:N7rZTh2G/iw4HuNYAsZ+RZrXI
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2868 dbilzqh.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\dbilzqh.exe 32c8c18695345c5cb012259b26e44dd0_NeikiAnalytics.exe File created C:\PROGRA~3\Mozilla\zxoabnc.dll dbilzqh.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 912 32c8c18695345c5cb012259b26e44dd0_NeikiAnalytics.exe 2868 dbilzqh.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2868 2088 taskeng.exe 29 PID 2088 wrote to memory of 2868 2088 taskeng.exe 29 PID 2088 wrote to memory of 2868 2088 taskeng.exe 29 PID 2088 wrote to memory of 2868 2088 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\32c8c18695345c5cb012259b26e44dd0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\32c8c18695345c5cb012259b26e44dd0_NeikiAnalytics.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:912
-
C:\Windows\system32\taskeng.exetaskeng.exe {3D37FF2D-CD89-42C1-859A-ABA6EAC04AEC} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\PROGRA~3\Mozilla\dbilzqh.exeC:\PROGRA~3\Mozilla\dbilzqh.exe -kwinamg2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
224KB
MD54742761f3ac97a450beb8bc8a5ea0028
SHA199ab5e0e4ab9b8ff44c43a473cd654e14fbde10a
SHA25675eb5d4f3ee180b0de05dff8ecb58cce37f53d7377f5b0a4e6ceab0862e2dd71
SHA512e8d4398b2e9f9cae35447f762aae958285a894e7c209e61c69bb661f2e9e95b5e1f44d11a529edc1f4bf1253abaabf0f6dca46acdb9ff4bb6c99c2c07167bfb4