Analysis

  • max time kernel
    144s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/05/2024, 00:49

General

  • Target

    70098f2fb69b8cc8236e91bdf3b516e0_NeikiAnalytics.exe

  • Size

    1.8MB

  • MD5

    70098f2fb69b8cc8236e91bdf3b516e0

  • SHA1

    43937fb0cd59551aeb363d257f98cf503cc89613

  • SHA256

    c93618a092699613bb7a89e0f587dcd4474c0dff292836efb23a8159cf54d611

  • SHA512

    84c4aa7956bec66b0ac483f1de555aceed8a1a5321bfc6282a152d63cee4d498aa22ce0b488728324393eb5182691cc80a7e7988368e7006574c058d15928403

  • SSDEEP

    49152:Dz1BxUaJEDWCsVb6KUpZ+hDg1F2d6dK1fM:H1BaaW5SbWf+YFCEWfM

Score
7/10
upx

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 3 IoCs
  • UPX packed file 30 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 37 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\70098f2fb69b8cc8236e91bdf3b516e0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\70098f2fb69b8cc8236e91bdf3b516e0_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4964
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32 C:\¾º¼¼³¡2.0\dm.dll -s
      2⤵
      • Loads dropped DLL
      • Modifies registry class
      PID:4892
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3920 --field-trial-handle=2692,i,8678872182442199182,12502579059484928042,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4476

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\¾º¼¼³¡2.0\dm.dll

      Filesize

      804KB

      MD5

      c578b6820bda5689940560147c6e5ffc

      SHA1

      922e50d89c9c44bdc205ef17aa57212b64e58852

      SHA256

      3b6ddc32b800a18b21a819e842cbfdd57cb065fd92cc69545e0ef29b97cfd389

      SHA512

      9f2a1bb5788ad245242d12968bbf198af2694a87c6e2342f14672e8c14e8489dd3319434592fc9b20f620557d0fa58482903d19c7f5ba32456a1e4076dc1bb85

    • memory/4892-74-0x0000000010000000-0x0000000010176000-memory.dmp

      Filesize

      1.5MB

    • memory/4964-21-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/4964-1-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/4964-33-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/4964-46-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/4964-15-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/4964-41-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/4964-38-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/4964-31-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/4964-29-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/4964-27-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/4964-25-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/4964-23-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/4964-36-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/4964-0-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/4964-43-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/4964-13-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/4964-12-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/4964-10-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/4964-7-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/4964-5-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/4964-3-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/4964-2-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/4964-17-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/4964-19-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/4964-79-0x0000000003860000-0x00000000039D6000-memory.dmp

      Filesize

      1.5MB

    • memory/4964-78-0x0000000003860000-0x00000000039D6000-memory.dmp

      Filesize

      1.5MB

    • memory/4964-77-0x0000000010000000-0x000000001003E000-memory.dmp

      Filesize

      248KB

    • memory/4964-80-0x0000000003860000-0x00000000039D6000-memory.dmp

      Filesize

      1.5MB