Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    03-06-2024 20:48

General

  • Target

    00a85405c5dac086f44c019a13a4dc60_NeikiAnalytics.exe

  • Size

    409KB

  • MD5

    00a85405c5dac086f44c019a13a4dc60

  • SHA1

    af35cce9252fe968b785f340fe0438a957a5eff0

  • SHA256

    2d77ec342bc62fe11dcc79d0046d18a0476ae76679f444bf65e01ca381694fed

  • SHA512

    538bf3578d96b8126d743dcc06c6ce6abf1669c8bc57b02a68eae82c6b458f3d43ce2332923bbd8f6af8e4f76b9af99a8bc5768f69de8850d80fdcd77835ac90

  • SSDEEP

    12288:GrWcDkpFBK4TuxGzRrf1u+zV0+wqoKRx8y:GrWcDkpm4T9BzV0+vL8y

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\00a85405c5dac086f44c019a13a4dc60_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\00a85405c5dac086f44c019a13a4dc60_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1936
    • C:\Users\Admin\AppData\Local\Temp\8AF1.tmp
      "C:\Users\Admin\AppData\Local\Temp\8AF1.tmp" --pingC:\Users\Admin\AppData\Local\Temp\00a85405c5dac086f44c019a13a4dc60_NeikiAnalytics.exe 26E9EE2661D09E36CEECC8D17D7CF4AB4B9F974FBBA3E40DB508BFC87981AC47E164AD6C94EEEA0E4C8D3A65C82BD9C966311D735A8921983D5B372501B1E8BD
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:2984
      • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
        "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\00a85405c5dac086f44c019a13a4dc60_NeikiAnalytics.doc"
        3⤵
        • Drops file in Windows directory
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2572
        • C:\Windows\splwow64.exe
          C:\Windows\splwow64.exe 12288
          4⤵
            PID:2544

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\00a85405c5dac086f44c019a13a4dc60_NeikiAnalytics.doc

      Filesize

      21KB

      MD5

      12e57ae08f64353b3c3b3d08681aaaf1

      SHA1

      36b6aca282497c65d41513b231d247b0187651f1

      SHA256

      07498e905c47bfea983587265b88eb01bc6098978c375c71074b9469a99b4308

      SHA512

      aba2748b1b5d26f52a93bbfabbd4760435b06d6c449631930e7db339c5317429f59cc24709515707cdda34956c73d30e60b83b81986873eb544b1040388748a8

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      197779bd6057eafbd43bbd12e8916526

      SHA1

      a1181ee22821efa5537965d1aef96134d8bdd7d7

      SHA256

      052dcb74c70c0313f26f240e6d2cadfa421ae9304bd54eddd16270f946762a1d

      SHA512

      97cc2c252dcd8bf35781666ff1506e5c169fa874cfa8c34b07c7b2fb955dacf68e157bc5de170a902132eda059172332e619ee4e775adac8e24a1047ef0509c5

    • \Users\Admin\AppData\Local\Temp\8AF1.tmp

      Filesize

      409KB

      MD5

      0ca4d8578f55184d6ff2475f17b4ccd5

      SHA1

      a43a23ef95ce1498032079da3bc1fe0ba48e2b37

      SHA256

      23b2ef993e17f2d2b17a14643b6f8fb0e05af5cb881d5ccc54f4c0cd997ab84e

      SHA512

      182e26b1dd968954bb39ae9ad25dbc3efa826ea78ddcdc89f909027150ffd1bb50f91f96788a855a18570f2219ac7f04efb0046525e097025620fd1baa042ce3

    • memory/2572-7-0x000000002F571000-0x000000002F572000-memory.dmp

      Filesize

      4KB

    • memory/2572-8-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2572-9-0x000000007101D000-0x0000000071028000-memory.dmp

      Filesize

      44KB

    • memory/2572-19-0x000000007101D000-0x0000000071028000-memory.dmp

      Filesize

      44KB

    • memory/2572-34-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB