Analysis

  • max time kernel
    140s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    30/05/2024, 23:11

General

  • Target

    6c67fea9c60232a9e9ec02d2c20b0d60_NeikiAnalytics.exe

  • Size

    479KB

  • MD5

    6c67fea9c60232a9e9ec02d2c20b0d60

  • SHA1

    73abde7907c197c1e7738f08d5df24be0704f592

  • SHA256

    e7b09d5333180f77fd3306871397cce1541ae3c4afb73f8731f915d718e04ea5

  • SHA512

    080e2272aceea82cb5caea11c92e025a6bc43fb95ef0a4cc1401d2276454cf0a1381daba1174da30140bd860dae8d510bdffa3d7bf4708a5d94fb6987466c58a

  • SSDEEP

    6144:pjFRiOcXH6XWD0w1tizmtnktLJ6znvxNcCI+1jDIlnJ9+1aTEPTnOK4JKElDnWO:nRDc3yWDNU+YUznzNjElWaT07NQtDWO

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 2 IoCs
  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 13 IoCs
  • Modifies registry class 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6c67fea9c60232a9e9ec02d2c20b0d60_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\6c67fea9c60232a9e9ec02d2c20b0d60_NeikiAnalytics.exe"
    1⤵
    • Modifies firewall policy service
    • Adds policy Run key to start application
    • Sets service image path in registry
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    PID:1964

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\msrpc.exe

          Filesize

          479KB

          MD5

          766a5d3cc3c579e20743302ef4f6921d

          SHA1

          2d61df4b609c4ceda962b1b0656712c140cdf1f4

          SHA256

          a51a45fba73826d3bd48e90b43486d46e3318a1cbc6bff4cf7666059d66849ee

          SHA512

          ea11591096f301ab69e4b200fb3a13eb33856a3f4c482b656be3679e096d33a162ba766e44b6fad6dc27d75e883c7547011546832eedbec43090a2c8e582a893

        • memory/1964-21-0x0000000000400000-0x000000000047C000-memory.dmp

          Filesize

          496KB

        • memory/1964-3-0x00000000002A0000-0x00000000002A1000-memory.dmp

          Filesize

          4KB

        • memory/1964-1-0x0000000000400000-0x000000000047C000-memory.dmp

          Filesize

          496KB

        • memory/1964-19-0x0000000000400000-0x000000000047C000-memory.dmp

          Filesize

          496KB

        • memory/1964-20-0x0000000000400000-0x000000000047C000-memory.dmp

          Filesize

          496KB

        • memory/1964-0-0x00000000002A0000-0x00000000002A1000-memory.dmp

          Filesize

          4KB

        • memory/1964-22-0x0000000000400000-0x000000000047C000-memory.dmp

          Filesize

          496KB

        • memory/1964-23-0x0000000000400000-0x000000000047C000-memory.dmp

          Filesize

          496KB

        • memory/1964-24-0x0000000000400000-0x000000000047C000-memory.dmp

          Filesize

          496KB

        • memory/1964-25-0x0000000000400000-0x000000000047C000-memory.dmp

          Filesize

          496KB

        • memory/1964-26-0x0000000000400000-0x000000000047C000-memory.dmp

          Filesize

          496KB

        • memory/1964-27-0x0000000000400000-0x000000000047C000-memory.dmp

          Filesize

          496KB