Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-06-2024 05:58

General

  • Target

    35233a314deba2c4b9d932047fb909f0_NeikiAnalytics.exe

  • Size

    760KB

  • MD5

    35233a314deba2c4b9d932047fb909f0

  • SHA1

    1afbb6871100ee6fc762db17a7a087139dd8b0c7

  • SHA256

    3ae58e138e5053dcb25014f025d2eb9f94c0b9119f6e967ee7de6a974d846052

  • SHA512

    ea8b7eac0c3a49e6c8d76f117ea6cd5553135a4430df690f75e51856d477eeea4d9483a97ac2daa5661d8e5dc4197f2abd4e6bfcdcc79a2b26807d3510df1a61

  • SSDEEP

    12288:1/J/m71432pBsHMZ3tJnojSl27rLzqN8OUEeMT1TkcCDx4ZMr4Q0:1/A6GTVnojg2yNRXTkcCCZM8b

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\35233a314deba2c4b9d932047fb909f0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\35233a314deba2c4b9d932047fb909f0_NeikiAnalytics.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:3492
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a4E3F.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2296
      • C:\Users\Admin\AppData\Local\Temp\35233a314deba2c4b9d932047fb909f0_NeikiAnalytics.exe
        "C:\Users\Admin\AppData\Local\Temp\35233a314deba2c4b9d932047fb909f0_NeikiAnalytics.exe"
        3⤵
        • Executes dropped EXE
        PID:692
    • C:\Windows\Logo1_.exe
      C:\Windows\Logo1_.exe
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2400
      • C:\Windows\SysWOW64\net.exe
        net stop "Kingsoft AntiVirus Service"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1900
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"
          4⤵
            PID:3620

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\7-Zip\7zG.exe

      Filesize

      750KB

      MD5

      adbc65dcb22428fa2c9e7b4fee45cf5b

      SHA1

      bda76de5e43492e46614bb5a3e5b519b7c514e89

      SHA256

      e5f3305e688b82f4771cf1d9d10345190cabee3593e66c8263a81d2eb5ef9719

      SHA512

      d5dd5611e0b9322ef7fed74a13ae51eb51b3fa0cf39beffc47cbea64f8f6db02116e13a98c1f27d479b38ddd8abaa001b5e00471a92d42d918d06bbeff9a02f5

    • C:\Users\Admin\AppData\Local\Temp\$$a4E3F.bat

      Filesize

      620B

      MD5

      d7d0e1e16195585ded5ad04da0e3bad1

      SHA1

      ef231d298e8838cac7181410e075d2f889f04319

      SHA256

      07ffa9718736724ed848fb9ee96f0203cb14ddf171fec849245b9271a99aee14

      SHA512

      d595a06a40bb7253fb020dfa43ede8b7d634fef7e631b92bac78ff8aac48ac060b8708a08ad13603ddaba6077945abe2591edfe18904a4834bd865c8bd1db6d4

    • C:\Users\Admin\AppData\Local\Temp\35233a314deba2c4b9d932047fb909f0_NeikiAnalytics.exe.exe

      Filesize

      694KB

      MD5

      b0de85a29c0c43921883f2572f24042e

      SHA1

      0d1b0c04072035a595a96b87a7d9016392eb0484

      SHA256

      06d0b436d252a6913cf444c968f4d8575818edc9ea4b03d949e1e09be47baacb

      SHA512

      095638e3a65ef8f0b26d1d568d9de27ea3ecc992063b316bb04990d3155a906ac4f93eb1d7d1ee9935321d77de309cd1be31931293cc96da57118dc1de8a55e8

    • C:\Windows\Logo1_.exe

      Filesize

      66KB

      MD5

      d5ce6e9a0095d2407a515cbb43bc623f

      SHA1

      365caa12850a5db53dd6226b45883021d6622da0

      SHA256

      39eac222b016827c94ac668e61aec5169d36202cb5dc23e014a1cdf43d838834

      SHA512

      4af761ecea5b6b4738ab5d0542410e7a78e3f4d57a4e9660d94d8fd7130111277610bd672bd85204b8ca42aed06c953d5fbd9f2be7e67e19a9ade1944d40e122

    • memory/2400-15-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/2400-13-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/2400-12-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/2400-17-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/2400-141-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/2400-207-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/2400-213-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/2400-220-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB

    • memory/3492-7-0x0000000000400000-0x0000000000424000-memory.dmp

      Filesize

      144KB