Malware Analysis Report

2024-08-06 14:32

Sample ID 240529-2yzcvsea78
Target 597611f18793cf3c396365dd76938300_NeikiAnalytics.exe
SHA256 73c4ebfe87d16c25ab31a27fd11973581843d129834f1205b09acc863efa5b7e
Tags
upx modiloader persistence trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

73c4ebfe87d16c25ab31a27fd11973581843d129834f1205b09acc863efa5b7e

Threat Level: Known bad

The file 597611f18793cf3c396365dd76938300_NeikiAnalytics.exe was found to be: Known bad.

Malicious Activity Summary

upx modiloader persistence trojan

ModiLoader, DBatLoader

ModiLoader Second Stage

Checks computer location settings

Executes dropped EXE

UPX packed file

Loads dropped DLL

Adds Run key to start application

Suspicious use of SetThreadContext

Unsigned PE

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Suspicious use of SetWindowsHookEx

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-05-29 23:00

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-29 23:00

Reported

2024-05-29 23:02

Platform

win7-20240221-en

Max time kernel

150s

Max time network

123s

Command Line

"C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe"

Signatures

ModiLoader, DBatLoader

trojan modiloader

ModiLoader Second Stage

Description Indicator Process Target
N/A N/A N/A N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Win Pdf = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\csrsll.exe" C:\Windows\SysWOW64\reg.exe N/A

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2312 wrote to memory of 2836 N/A C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe
PID 2312 wrote to memory of 2836 N/A C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe
PID 2312 wrote to memory of 2836 N/A C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe
PID 2312 wrote to memory of 2836 N/A C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe
PID 2312 wrote to memory of 2836 N/A C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe
PID 2312 wrote to memory of 2836 N/A C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe
PID 2312 wrote to memory of 2836 N/A C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe
PID 2312 wrote to memory of 2836 N/A C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe
PID 2836 wrote to memory of 2340 N/A C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe C:\Windows\SysWOW64\cmd.exe
PID 2836 wrote to memory of 2340 N/A C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe C:\Windows\SysWOW64\cmd.exe
PID 2836 wrote to memory of 2340 N/A C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe C:\Windows\SysWOW64\cmd.exe
PID 2836 wrote to memory of 2340 N/A C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe C:\Windows\SysWOW64\cmd.exe
PID 2340 wrote to memory of 2596 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2340 wrote to memory of 2596 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2340 wrote to memory of 2596 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2340 wrote to memory of 2596 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 2836 wrote to memory of 1772 N/A C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 2836 wrote to memory of 1772 N/A C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 2836 wrote to memory of 1772 N/A C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 2836 wrote to memory of 1772 N/A C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1772 wrote to memory of 628 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1772 wrote to memory of 628 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1772 wrote to memory of 628 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1772 wrote to memory of 628 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1772 wrote to memory of 628 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1772 wrote to memory of 628 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1772 wrote to memory of 628 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1772 wrote to memory of 628 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1772 wrote to memory of 1152 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1772 wrote to memory of 1152 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1772 wrote to memory of 1152 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1772 wrote to memory of 1152 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1772 wrote to memory of 1152 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1772 wrote to memory of 1152 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1772 wrote to memory of 1152 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 1772 wrote to memory of 1152 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

Processes

C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe"

C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe"

C:\Windows\SysWOW64\cmd.exe

cmd /c ""C:\Users\Admin\AppData\Local\Temp\NRXDE.bat" "

C:\Windows\SysWOW64\reg.exe

REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Win Pdf" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe" /f

C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"

C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"

C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 billabong4102.no-ip.biz udp

Files

memory/2312-0-0x0000000000400000-0x0000000000453000-memory.dmp

memory/2312-3-0x00000000003B0000-0x00000000003B1000-memory.dmp

memory/2312-15-0x00000000003D0000-0x00000000003D1000-memory.dmp

memory/2312-5-0x00000000003B0000-0x00000000003B1000-memory.dmp

memory/2312-92-0x0000000000400000-0x0000000000453000-memory.dmp

memory/2312-89-0x0000000000400000-0x0000000000453000-memory.dmp

memory/2312-82-0x0000000000400000-0x0000000000453000-memory.dmp

memory/2312-81-0x0000000000400000-0x0000000000453000-memory.dmp

memory/2312-79-0x00000000004F0000-0x00000000004F2000-memory.dmp

memory/2312-78-0x0000000000404000-0x0000000000405000-memory.dmp

memory/2312-75-0x0000000000400000-0x0000000000453000-memory.dmp

memory/2312-69-0x00000000004D0000-0x00000000004D1000-memory.dmp

memory/2312-59-0x00000000004B0000-0x00000000004B1000-memory.dmp

memory/2312-39-0x0000000000470000-0x0000000000471000-memory.dmp

memory/2312-27-0x00000000003F0000-0x00000000003F1000-memory.dmp

memory/2836-104-0x0000000000400000-0x000000000040B000-memory.dmp

memory/2836-103-0x0000000000400000-0x000000000040B000-memory.dmp

memory/2836-101-0x0000000000400000-0x000000000040B000-memory.dmp

memory/2836-99-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/2836-97-0x0000000000400000-0x000000000040B000-memory.dmp

memory/2836-95-0x0000000000400000-0x000000000040B000-memory.dmp

memory/2836-93-0x0000000000400000-0x000000000040B000-memory.dmp

memory/2312-106-0x0000000000400000-0x0000000000453000-memory.dmp

memory/2836-107-0x0000000000400000-0x000000000040B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\NRXDE.bat

MD5 4eb61ec7816c34ec8c125acadc57ec1b
SHA1 b0015cc865c0bb1a027be663027d3829401a31cc
SHA256 08375cdb2e9819391f67f71e9718c15b48d3eaa452c54bd8fdd1f6a42e899aff
SHA512 f289f01d996dd643560370be8cdf8894e9a676ca3813f706c01ef5d705b9b18246c6cadf10d96edd433a616637b8a78fbd23c5738e76f1c4e671977b6d0cb6c1

\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

MD5 c44b75522535944c4fb34908affcf58c
SHA1 6ec9c8d1bbbb941610a31c0a58c2831f96fa2159
SHA256 99519f0a8fb18009130e37bc81c5698eb329a7e4e4aba2a3c8b2cf7ee557b054
SHA512 4fe884632529b6ced7035343228944b47cbb8f874de9aeb0e65c25dbd5aff90334c372b5a6690d626a552425826e54aa4897b92f3cfc4467c36c383d9dd85222

memory/2836-135-0x0000000001F80000-0x0000000001FD3000-memory.dmp

memory/2836-148-0x0000000001F80000-0x0000000001FD3000-memory.dmp

memory/2836-153-0x0000000000400000-0x000000000040B000-memory.dmp

memory/1772-156-0x0000000000230000-0x0000000000231000-memory.dmp

memory/1772-177-0x0000000000300000-0x0000000000301000-memory.dmp

memory/1772-222-0x0000000000400000-0x0000000000453000-memory.dmp

memory/1772-166-0x0000000000250000-0x0000000000251000-memory.dmp

memory/1152-247-0x0000000000400000-0x0000000000414000-memory.dmp

memory/1772-253-0x0000000000400000-0x0000000000453000-memory.dmp

memory/2836-256-0x0000000000400000-0x000000000040B000-memory.dmp

memory/628-261-0x0000000000400000-0x000000000040B000-memory.dmp

memory/1152-262-0x0000000000400000-0x0000000000414000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-29 23:00

Reported

2024-05-29 23:02

Platform

win10v2004-20240426-en

Max time kernel

149s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe"

Signatures

ModiLoader, DBatLoader

trojan modiloader

ModiLoader Second Stage

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Win Pdf = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\csrsll.exe" C:\Windows\SysWOW64\reg.exe N/A

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1624 wrote to memory of 4508 N/A C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe
PID 1624 wrote to memory of 4508 N/A C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe
PID 1624 wrote to memory of 4508 N/A C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe
PID 1624 wrote to memory of 4508 N/A C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe
PID 1624 wrote to memory of 4508 N/A C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe
PID 1624 wrote to memory of 4508 N/A C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe
PID 1624 wrote to memory of 4508 N/A C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe
PID 1624 wrote to memory of 4508 N/A C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe
PID 4508 wrote to memory of 1148 N/A C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe C:\Windows\SysWOW64\cmd.exe
PID 4508 wrote to memory of 1148 N/A C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe C:\Windows\SysWOW64\cmd.exe
PID 4508 wrote to memory of 1148 N/A C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe C:\Windows\SysWOW64\cmd.exe
PID 1148 wrote to memory of 2264 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 1148 wrote to memory of 2264 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 1148 wrote to memory of 2264 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\reg.exe
PID 4508 wrote to memory of 2784 N/A C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4508 wrote to memory of 2784 N/A C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 4508 wrote to memory of 2784 N/A C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 2784 wrote to memory of 460 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 2784 wrote to memory of 460 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 2784 wrote to memory of 460 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 2784 wrote to memory of 460 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 2784 wrote to memory of 460 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 2784 wrote to memory of 460 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 2784 wrote to memory of 460 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 2784 wrote to memory of 460 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 2784 wrote to memory of 5060 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 2784 wrote to memory of 5060 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 2784 wrote to memory of 5060 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 2784 wrote to memory of 5060 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 2784 wrote to memory of 5060 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 2784 wrote to memory of 5060 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 2784 wrote to memory of 5060 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe
PID 2784 wrote to memory of 5060 N/A C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

Processes

C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe"

C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\597611f18793cf3c396365dd76938300_NeikiAnalytics.exe"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\TQPTG.bat" "

C:\Windows\SysWOW64\reg.exe

REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Win Pdf" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe" /f

C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"

C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"

C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 144.107.17.2.in-addr.arpa udp
US 8.8.8.8:53 134.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 99.58.20.217.in-addr.arpa udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 43.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp
US 8.8.8.8:53 24.73.42.20.in-addr.arpa udp
US 8.8.8.8:53 billabong4102.no-ip.biz udp

Files

memory/1624-0-0x0000000000400000-0x0000000000453000-memory.dmp

memory/4508-3-0x0000000000400000-0x000000000040B000-memory.dmp

memory/1624-6-0x00000000022C0000-0x00000000022C2000-memory.dmp

memory/4508-9-0x0000000000400000-0x000000000040B000-memory.dmp

memory/4508-11-0x0000000000400000-0x000000000040B000-memory.dmp

memory/1624-12-0x0000000000400000-0x0000000000453000-memory.dmp

memory/1624-8-0x0000000002A40000-0x0000000002A42000-memory.dmp

memory/1624-7-0x00000000022D0000-0x00000000022D2000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\TQPTG.txt

MD5 4eb61ec7816c34ec8c125acadc57ec1b
SHA1 b0015cc865c0bb1a027be663027d3829401a31cc
SHA256 08375cdb2e9819391f67f71e9718c15b48d3eaa452c54bd8fdd1f6a42e899aff
SHA512 f289f01d996dd643560370be8cdf8894e9a676ca3813f706c01ef5d705b9b18246c6cadf10d96edd433a616637b8a78fbd23c5738e76f1c4e671977b6d0cb6c1

C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe

MD5 597611f18793cf3c396365dd76938300
SHA1 36c75db9a2739025754e4a6366ef1ab0af523e62
SHA256 73c4ebfe87d16c25ab31a27fd11973581843d129834f1205b09acc863efa5b7e
SHA512 1ba8d2f5ba96946531bcd900c1b75dc1d7a90a8a760bbca6c26c8556fb17b7d6de96d33dc94386f658e3ede61e1ca64f540b8894078ea38162dad6198c478c0f

memory/5060-48-0x0000000000400000-0x0000000000414000-memory.dmp

memory/2784-46-0x0000000000400000-0x0000000000453000-memory.dmp

memory/5060-49-0x0000000000400000-0x0000000000414000-memory.dmp

memory/5060-51-0x0000000000400000-0x0000000000414000-memory.dmp

memory/5060-53-0x0000000000400000-0x0000000000414000-memory.dmp

memory/5060-40-0x0000000000400000-0x0000000000414000-memory.dmp

memory/4508-57-0x0000000000400000-0x000000000040B000-memory.dmp

memory/4508-55-0x0000000000410000-0x00000000004D9000-memory.dmp

memory/460-58-0x0000000000400000-0x000000000040B000-memory.dmp

memory/5060-59-0x0000000000400000-0x0000000000414000-memory.dmp