Analysis
-
max time kernel
122s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
05-06-2024 05:12
Behavioral task
behavioral1
Sample
3e1590504d0b796d8edacd2ba4c552b0_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
3e1590504d0b796d8edacd2ba4c552b0_NeikiAnalytics.exe
-
Size
113KB
-
MD5
3e1590504d0b796d8edacd2ba4c552b0
-
SHA1
08bc8e65733be98b905c9d7ed998105c4e4c115a
-
SHA256
27387c160c754ba84f2dab3cfae5f0a5b1781647c535df297cee1ee3ad15e2bf
-
SHA512
1a2aab66595002f0f0d938e70c1cc7bc129fd94c3c727016d1ad879a6c8348f709640f818048eb7a343832d7e41f2b88440c69b31a33c1cec51288dafd288255
-
SSDEEP
1536:mCnrJLwAXDtIBcUyk+8CooNvy3GNbcq7+sWjcdgy64TNSeY:htpCP+/oGvWSldgy64TNSeY
Malware Config
Extracted
urelas
218.54.47.76
218.54.47.77
218.54.47.74
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2668 cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
biudfw.exepid process 2396 biudfw.exe -
Loads dropped DLL 1 IoCs
Processes:
3e1590504d0b796d8edacd2ba4c552b0_NeikiAnalytics.exepid process 3048 3e1590504d0b796d8edacd2ba4c552b0_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
3e1590504d0b796d8edacd2ba4c552b0_NeikiAnalytics.exedescription pid process target process PID 3048 wrote to memory of 2396 3048 3e1590504d0b796d8edacd2ba4c552b0_NeikiAnalytics.exe biudfw.exe PID 3048 wrote to memory of 2396 3048 3e1590504d0b796d8edacd2ba4c552b0_NeikiAnalytics.exe biudfw.exe PID 3048 wrote to memory of 2396 3048 3e1590504d0b796d8edacd2ba4c552b0_NeikiAnalytics.exe biudfw.exe PID 3048 wrote to memory of 2396 3048 3e1590504d0b796d8edacd2ba4c552b0_NeikiAnalytics.exe biudfw.exe PID 3048 wrote to memory of 2668 3048 3e1590504d0b796d8edacd2ba4c552b0_NeikiAnalytics.exe cmd.exe PID 3048 wrote to memory of 2668 3048 3e1590504d0b796d8edacd2ba4c552b0_NeikiAnalytics.exe cmd.exe PID 3048 wrote to memory of 2668 3048 3e1590504d0b796d8edacd2ba4c552b0_NeikiAnalytics.exe cmd.exe PID 3048 wrote to memory of 2668 3048 3e1590504d0b796d8edacd2ba4c552b0_NeikiAnalytics.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e1590504d0b796d8edacd2ba4c552b0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3e1590504d0b796d8edacd2ba4c552b0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\biudfw.exe"C:\Users\Admin\AppData\Local\Temp\biudfw.exe"2⤵
- Executes dropped EXE
PID:2396
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- Deletes itself
PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
113KB
MD5fcc1794585a23be5a1d78473a2c405df
SHA12228f1c8eae281b7c8bde5761bbda2e303d4115d
SHA2564aa4e5526fe7814621f87e962f1a4bdf069e8fe549c3a967d1c2d15b52963fcf
SHA5123453c9c9e0725c7ccbe19c3858324eb984f904390843d3c2080bb90b23c6134a1b7410070ff86c4a7cd35e9d2eead4d271df80a7a10617bc593a78f97fb9a4a0
-
Filesize
512B
MD5f0d42f2e44d35f66afa6c7a98d053021
SHA1f874284acb7ed4b80e2733ed4f66656bd2c5447d
SHA256d2060822260cd38f5fc68b1f3b9f9b787b250e1a9fa417be79cdc692ca066f8d
SHA512d5b9a5e504276623574ba2c16e6d305c86b20ff3e6353dbe251e04287583c27d825fddfe4325530c249cc95ddd3e0674c86acdf2e7f4bd3c3404eab51c022a94
-
Filesize
304B
MD5b5372fbaaf31b25910fd09fb664072a1
SHA16b99f4f7b00a47097d23bbb8dd4cc291c5032646
SHA25652e23ccdebcf99a8cf63bd06cab7a5062b73dfde28aa3b84c78ca58fe45aca14
SHA5124769bac8001172c59a0d8418ca75e9a36793b005fa6153cb739c01658f05db705821b2020a0ff4a53219de354f534ab094133bd243a5834073ba990e7c4c23e1