Analysis
-
max time kernel
149s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30-05-2024 00:11
Static task
static1
Behavioral task
behavioral1
Sample
5beb5c1df539fdefc47491e06b7c6510_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
5beb5c1df539fdefc47491e06b7c6510_NeikiAnalytics.exe
-
Size
6.4MB
-
MD5
5beb5c1df539fdefc47491e06b7c6510
-
SHA1
fe79e82fa0bc860454fd6c0721fc7c117b7cf23c
-
SHA256
92c1e8cd4c189dd0f3670de1facbd3b10db0a1696fce4f7f328c2adc37961fc6
-
SHA512
04edbfdd82b7ffcbd7471b7ac5c2da29c947a74848c7d87b6003576a5da43a84072aad72c2ec9d9b08f8c6004f7a6b8bbfb111611209d4b495a8150903cf30f3
-
SSDEEP
98304:Roc5swrA2XGxlHKcjTjNk3o659yrnfKtDrKIAyyks+Ctf8mQZVSc:i0LrA2kHKQHNk3og9unipQyOaOc
Malware Config
Extracted
urelas
218.54.31.165
218.54.31.226
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2520 cmd.exe -
Executes dropped EXE 3 IoCs
Processes:
fowod.exedabyqa.exerojuq.exepid process 2500 fowod.exe 1176 dabyqa.exe 1396 rojuq.exe -
Loads dropped DLL 5 IoCs
Processes:
5beb5c1df539fdefc47491e06b7c6510_NeikiAnalytics.exefowod.exedabyqa.exepid process 2196 5beb5c1df539fdefc47491e06b7c6510_NeikiAnalytics.exe 2196 5beb5c1df539fdefc47491e06b7c6510_NeikiAnalytics.exe 2500 fowod.exe 2500 fowod.exe 1176 dabyqa.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\rojuq.exe upx behavioral1/memory/1396-163-0x0000000000400000-0x0000000000599000-memory.dmp upx behavioral1/memory/1396-176-0x0000000000400000-0x0000000000599000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 15 IoCs
Processes:
5beb5c1df539fdefc47491e06b7c6510_NeikiAnalytics.exefowod.exedabyqa.exerojuq.exepid process 2196 5beb5c1df539fdefc47491e06b7c6510_NeikiAnalytics.exe 2500 fowod.exe 1176 dabyqa.exe 1396 rojuq.exe 1396 rojuq.exe 1396 rojuq.exe 1396 rojuq.exe 1396 rojuq.exe 1396 rojuq.exe 1396 rojuq.exe 1396 rojuq.exe 1396 rojuq.exe 1396 rojuq.exe 1396 rojuq.exe 1396 rojuq.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
5beb5c1df539fdefc47491e06b7c6510_NeikiAnalytics.exefowod.exedabyqa.exedescription pid process target process PID 2196 wrote to memory of 2500 2196 5beb5c1df539fdefc47491e06b7c6510_NeikiAnalytics.exe fowod.exe PID 2196 wrote to memory of 2500 2196 5beb5c1df539fdefc47491e06b7c6510_NeikiAnalytics.exe fowod.exe PID 2196 wrote to memory of 2500 2196 5beb5c1df539fdefc47491e06b7c6510_NeikiAnalytics.exe fowod.exe PID 2196 wrote to memory of 2500 2196 5beb5c1df539fdefc47491e06b7c6510_NeikiAnalytics.exe fowod.exe PID 2196 wrote to memory of 2520 2196 5beb5c1df539fdefc47491e06b7c6510_NeikiAnalytics.exe cmd.exe PID 2196 wrote to memory of 2520 2196 5beb5c1df539fdefc47491e06b7c6510_NeikiAnalytics.exe cmd.exe PID 2196 wrote to memory of 2520 2196 5beb5c1df539fdefc47491e06b7c6510_NeikiAnalytics.exe cmd.exe PID 2196 wrote to memory of 2520 2196 5beb5c1df539fdefc47491e06b7c6510_NeikiAnalytics.exe cmd.exe PID 2500 wrote to memory of 1176 2500 fowod.exe dabyqa.exe PID 2500 wrote to memory of 1176 2500 fowod.exe dabyqa.exe PID 2500 wrote to memory of 1176 2500 fowod.exe dabyqa.exe PID 2500 wrote to memory of 1176 2500 fowod.exe dabyqa.exe PID 1176 wrote to memory of 1396 1176 dabyqa.exe rojuq.exe PID 1176 wrote to memory of 1396 1176 dabyqa.exe rojuq.exe PID 1176 wrote to memory of 1396 1176 dabyqa.exe rojuq.exe PID 1176 wrote to memory of 1396 1176 dabyqa.exe rojuq.exe PID 1176 wrote to memory of 2200 1176 dabyqa.exe cmd.exe PID 1176 wrote to memory of 2200 1176 dabyqa.exe cmd.exe PID 1176 wrote to memory of 2200 1176 dabyqa.exe cmd.exe PID 1176 wrote to memory of 2200 1176 dabyqa.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5beb5c1df539fdefc47491e06b7c6510_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\5beb5c1df539fdefc47491e06b7c6510_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\fowod.exe"C:\Users\Admin\AppData\Local\Temp\fowod.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\dabyqa.exe"C:\Users\Admin\AppData\Local\Temp\dabyqa.exe" OK3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\rojuq.exe"C:\Users\Admin\AppData\Local\Temp\rojuq.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\_vslite.batFilesize
224B
MD5bde4995892d5a8fe6759c53298e26850
SHA18755d72109f401a12e780f4437a7d14b9b40102a
SHA256ea8a86f9348707809c1df31c40560519d0accc1c90e2244956ab335c4a109393
SHA5129335975de4870d9a7cc6d1118c5d27f014a90a5cd6e2cd8850e4ff590a5c626f3bd5208efa99e8a3ce3a55c15ebf8d0e88518a11a87c5f6fadd0e291e576761d
-
C:\Users\Admin\AppData\Local\Temp\_vslite.batFilesize
306B
MD5a8165f163d9ab545285de169675344b2
SHA1db50944f989467d57346d14239d7831bc9b1937e
SHA256571ed356a8cbd6ee680de68bc353b8991889386be6bb80467cb2a7d44873cc46
SHA5129cd0b4fbd131a7dc3d46bef2ea813dec1663d0ea2a3ed27410ec17e6adaf1f175a037d940067d8469acdfc26f6a73ba5952d28839afdee9339f14ad491767e58
-
C:\Users\Admin\AppData\Local\Temp\gbp.iniFilesize
104B
MD5dbef593bccc2049f860f718cd6fec321
SHA1e7e9f8235b4eb70aa99dd2c38009f2152575a8d0
SHA25630f820bb1ca6c20bcd77113c7377e01f31cdf0ec5b64864f22887d41a9bf3c7a
SHA5123e87c661c343b72f5dff4587b99688dbf655be9d6d903a75151bd9f204f55858e90388591f660bcbded5278ef94e322bf3e7c57374c9b16fce1eef7082395a2a
-
C:\Users\Admin\AppData\Local\Temp\golfinfo.iniFilesize
512B
MD5e296cea35bd105ec7b0269c794c3afd8
SHA1dd8d6db1e34732c5e9c1234539a3829f8a9a7d8f
SHA256347dbd9c7d9a157dc2ff9eec1bc4bf2e940cba2081c6fcda648375beff6896b8
SHA512507548a3cefda12bb56cc249c8cbac8373ab73d627a3dc7d1a3de42443d13787a06902e27ede2cb57664c73027525880a7b816eb0d2369491576e04ce4143e49
-
\Users\Admin\AppData\Local\Temp\fowod.exeFilesize
6.4MB
MD552198bc1601fbcc2217e7473e618a842
SHA1f3d0ea359a0685107db7e086046add9e1439c87a
SHA256fdf8c236585b0c35874e3fd0886f9a8c084e6f3ecf584694c88e119d6148f910
SHA51271160032709a65805cc8d8f59b96dffe19330a98c3e60ba0a021317ca11d25e9661349ea0d005f242f04ebe06525d844c5f29cf5aa1749685e0dabb9af185d82
-
\Users\Admin\AppData\Local\Temp\rojuq.exeFilesize
459KB
MD59667106721ed718db9f51698eb5b8b5f
SHA159281e92c0c8faaa6bc6f4f57e475772e417e1cb
SHA256f53b0c66294e21d6c39a7c68a6551be05ac96e281e3067e4fffdc7c9f39bea04
SHA512cccdbb18e1d300570bce1afa4ce1cea6314c93320715e95e944e7fae9def6f1371efbe5ec7a1beb0139fc209a30765574166166f86c33528986e585f58c88a22
-
memory/1176-171-0x0000000000400000-0x0000000000EEC000-memory.dmpFilesize
10.9MB
-
memory/1176-161-0x0000000004220000-0x00000000043B9000-memory.dmpFilesize
1.6MB
-
memory/1396-176-0x0000000000400000-0x0000000000599000-memory.dmpFilesize
1.6MB
-
memory/1396-163-0x0000000000400000-0x0000000000599000-memory.dmpFilesize
1.6MB
-
memory/2196-61-0x0000000000400000-0x0000000000EEC000-memory.dmpFilesize
10.9MB
-
memory/2196-63-0x0000000003970000-0x000000000445C000-memory.dmpFilesize
10.9MB
-
memory/2196-2-0x0000000000240000-0x0000000000241000-memory.dmpFilesize
4KB
-
memory/2196-1-0x0000000000526000-0x000000000087A000-memory.dmpFilesize
3.3MB
-
memory/2196-26-0x0000000000280000-0x0000000000281000-memory.dmpFilesize
4KB
-
memory/2196-36-0x00000000002A0000-0x00000000002A1000-memory.dmpFilesize
4KB
-
memory/2196-34-0x00000000002A0000-0x00000000002A1000-memory.dmpFilesize
4KB
-
memory/2196-31-0x0000000000290000-0x0000000000291000-memory.dmpFilesize
4KB
-
memory/2196-29-0x0000000000290000-0x0000000000291000-memory.dmpFilesize
4KB
-
memory/2196-41-0x0000000000400000-0x0000000000EEC000-memory.dmpFilesize
10.9MB
-
memory/2196-42-0x0000000000400000-0x0000000000EEC000-memory.dmpFilesize
10.9MB
-
memory/2196-6-0x0000000000240000-0x0000000000241000-memory.dmpFilesize
4KB
-
memory/2196-7-0x0000000000250000-0x0000000000251000-memory.dmpFilesize
4KB
-
memory/2196-56-0x0000000003970000-0x000000000445C000-memory.dmpFilesize
10.9MB
-
memory/2196-0-0x0000000000400000-0x0000000000EEC000-memory.dmpFilesize
10.9MB
-
memory/2196-87-0x0000000000526000-0x000000000087A000-memory.dmpFilesize
3.3MB
-
memory/2196-24-0x0000000000280000-0x0000000000281000-memory.dmpFilesize
4KB
-
memory/2196-21-0x0000000000270000-0x0000000000271000-memory.dmpFilesize
4KB
-
memory/2196-19-0x0000000000270000-0x0000000000271000-memory.dmpFilesize
4KB
-
memory/2196-16-0x0000000000260000-0x0000000000261000-memory.dmpFilesize
4KB
-
memory/2196-9-0x0000000000250000-0x0000000000251000-memory.dmpFilesize
4KB
-
memory/2196-14-0x0000000000260000-0x0000000000261000-memory.dmpFilesize
4KB
-
memory/2196-12-0x0000000000260000-0x0000000000261000-memory.dmpFilesize
4KB
-
memory/2196-11-0x0000000000250000-0x0000000000251000-memory.dmpFilesize
4KB
-
memory/2196-4-0x0000000000240000-0x0000000000241000-memory.dmpFilesize
4KB
-
memory/2500-116-0x0000000003CA0000-0x000000000478C000-memory.dmpFilesize
10.9MB
-
memory/2500-71-0x00000000001D0000-0x00000000001D1000-memory.dmpFilesize
4KB
-
memory/2500-66-0x00000000001C0000-0x00000000001C1000-memory.dmpFilesize
4KB
-
memory/2500-73-0x00000000001D0000-0x00000000001D1000-memory.dmpFilesize
4KB
-
memory/2500-105-0x0000000000400000-0x0000000000EEC000-memory.dmpFilesize
10.9MB
-
memory/2500-115-0x0000000000400000-0x0000000000EEC000-memory.dmpFilesize
10.9MB
-
memory/2500-68-0x00000000001C0000-0x00000000001C1000-memory.dmpFilesize
4KB
-
memory/2500-76-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/2500-103-0x0000000000400000-0x0000000000EEC000-memory.dmpFilesize
10.9MB
-
memory/2500-81-0x00000000001F0000-0x00000000001F1000-memory.dmpFilesize
4KB
-
memory/2500-78-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/2500-83-0x00000000001F0000-0x00000000001F1000-memory.dmpFilesize
4KB
-
memory/2500-86-0x0000000000200000-0x0000000000201000-memory.dmpFilesize
4KB
-
memory/2500-89-0x0000000000200000-0x0000000000201000-memory.dmpFilesize
4KB