Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
05-06-2024 08:21
Static task
static1
Behavioral task
behavioral1
Sample
4b4127e52c665a281752581179575430_NeikiAnalytics.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
4b4127e52c665a281752581179575430_NeikiAnalytics.dll
Resource
win10v2004-20240508-en
General
-
Target
4b4127e52c665a281752581179575430_NeikiAnalytics.dll
-
Size
752KB
-
MD5
4b4127e52c665a281752581179575430
-
SHA1
c4b3a00278b6a41caf09138ae877afc6892a78bc
-
SHA256
db0b2b8efdc4a8679c545205a5188a98f6fd9659839848f3d462272c1c5f2c57
-
SHA512
418c1dce9ea6d684c67667c13fba3fce83e65804dc2c33a47cd56c5a49bf660e282aac02db8f6ee51f3994108f2c1960a0866c809260d6ba888ece362d97dfa4
-
SSDEEP
6144:ei05kH9OyU2uv5SRf/FWgFgtbgqIRAUW9kVYeVprU4wfhTv5xD2ZP0GVGdXcukTt:xrHGPv5SmptsDmUWuVZkxikdXcqut
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1200 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\Aknlhzir = "\"C:\\Users\\Admin\\AppData\\Roaming\\xRNN\\dpapimig.exe\"" Process not Found -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\8714\SystemPropertiesDataExecutionPrevention.exe cmd.exe File opened for modification C:\Windows\system32\8714\SystemPropertiesDataExecutionPrevention.exe cmd.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2924 schtasks.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\MSCFile\shell Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\MSCFile\shell\open\command\ = "C:\\Windows\\system32\\cmd.exe /c C:\\Users\\Admin\\AppData\\Local\\Temp\\QHHOjp.cmd" Process not Found Key deleted \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\MSCFile\shell\open\command Process not Found Key deleted \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\MSCFile\shell\open Process not Found Key deleted \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\MSCFile\shell Process not Found Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\MSCFile\shell\open\command Process not Found Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\MSCFile\shell\open Process not Found Key deleted \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\MSCFile Process not Found Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000_CLASSES\MSCFile Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2980 rundll32.exe 2980 rundll32.exe 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1200 wrote to memory of 2396 1200 Process not Found 28 PID 1200 wrote to memory of 2396 1200 Process not Found 28 PID 1200 wrote to memory of 2396 1200 Process not Found 28 PID 1200 wrote to memory of 2548 1200 Process not Found 29 PID 1200 wrote to memory of 2548 1200 Process not Found 29 PID 1200 wrote to memory of 2548 1200 Process not Found 29 PID 1200 wrote to memory of 2432 1200 Process not Found 30 PID 1200 wrote to memory of 2432 1200 Process not Found 30 PID 1200 wrote to memory of 2432 1200 Process not Found 30 PID 1200 wrote to memory of 2480 1200 Process not Found 31 PID 1200 wrote to memory of 2480 1200 Process not Found 31 PID 1200 wrote to memory of 2480 1200 Process not Found 31 PID 1200 wrote to memory of 1764 1200 Process not Found 33 PID 1200 wrote to memory of 1764 1200 Process not Found 33 PID 1200 wrote to memory of 1764 1200 Process not Found 33 PID 1764 wrote to memory of 2668 1764 cmd.exe 35 PID 1764 wrote to memory of 2668 1764 cmd.exe 35 PID 1764 wrote to memory of 2668 1764 cmd.exe 35 PID 1200 wrote to memory of 2700 1200 Process not Found 36 PID 1200 wrote to memory of 2700 1200 Process not Found 36 PID 1200 wrote to memory of 2700 1200 Process not Found 36 PID 1200 wrote to memory of 2672 1200 Process not Found 37 PID 1200 wrote to memory of 2672 1200 Process not Found 37 PID 1200 wrote to memory of 2672 1200 Process not Found 37 PID 1200 wrote to memory of 2800 1200 Process not Found 39 PID 1200 wrote to memory of 2800 1200 Process not Found 39 PID 1200 wrote to memory of 2800 1200 Process not Found 39 PID 2800 wrote to memory of 1448 2800 eventvwr.exe 40 PID 2800 wrote to memory of 1448 2800 eventvwr.exe 40 PID 2800 wrote to memory of 1448 2800 eventvwr.exe 40 PID 1448 wrote to memory of 2924 1448 cmd.exe 42 PID 1448 wrote to memory of 2924 1448 cmd.exe 42 PID 1448 wrote to memory of 2924 1448 cmd.exe 42 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b4127e52c665a281752581179575430_NeikiAnalytics.dll,#11⤵
- Suspicious behavior: EnumeratesProcesses
PID:2980
-
C:\Windows\system32\pcaui.exeC:\Windows\system32\pcaui.exe1⤵PID:2396
-
C:\Windows\system32\mshta.exeC:\Windows\system32\mshta.exe1⤵PID:2548
-
C:\Windows\system32\dpapimig.exeC:\Windows\system32\dpapimig.exe1⤵PID:2432
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\Wgmi.cmd1⤵PID:2480
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Delete /F /TN "User_Feed_Synchronization-{af200ed5-1aeb-7147-dc8f-85fa319e0b86}"1⤵
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\system32\schtasks.exeschtasks.exe /Delete /F /TN "User_Feed_Synchronization-{af200ed5-1aeb-7147-dc8f-85fa319e0b86}"2⤵PID:2668
-
-
C:\Windows\system32\SystemPropertiesDataExecutionPrevention.exeC:\Windows\system32\SystemPropertiesDataExecutionPrevention.exe1⤵PID:2700
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\P2QLF0.cmd1⤵
- Drops file in System32 directory
PID:2672
-
C:\Windows\System32\eventvwr.exe"C:\Windows\System32\eventvwr.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\QHHOjp.cmd2⤵
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\system32\schtasks.exeschtasks.exe /Create /F /TN "Cnmwowrqih" /SC minute /MO 60 /TR "C:\Windows\system32\8714\SystemPropertiesDataExecutionPrevention.exe" /RL highest3⤵
- Creates scheduled task(s)
PID:2924
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
756KB
MD597723fb9610e40a11964469250420874
SHA19a54221c98f65c581c2a5810e7fb8758a093635f
SHA256cea426e001921e8047794596e9e602515170a05e0223656b0b64ebf5278dbec7
SHA512c894557cf6ace02e7c7c4870471a299f082495aff99ec3f665ab4706efb5bc25c5c19d3a04073c52091281a23461b2803384fee61bcc7550823cc1ca1f383098
-
Filesize
223B
MD55fbbe9b63b82a45f5b8c0583a81554a1
SHA1b0aa9c1ae0beae525de1cd13f2e29a283b24e317
SHA256a2bafb2ebd9ded1056b9788697685accc169e3225352a26214c5d04a9523c1b9
SHA51274a87d9e85a61474764a01245002828681d352b135711b9acdcdfe9e67a70ef5bd7a15750a7800d4ee7293cb280f909e79982d0d998fc12339275c5665ec186b
-
Filesize
160B
MD5d4d41d452c4287859182f05d90ec95da
SHA12605a6aef3b30cd48bf81ed365365f76cd2870bf
SHA25679bb4264924bf6ed81751b000fdf82a102f5360cd62c1fd6604ee48adf601c82
SHA512bc5de4fec5d7195d3be19a80c116ff5c3f4ac6c2a85c6f0979d18d8195f452cb6900edfb20e9fa2ab233081b6b94668ebc755a725d1a94161dcd29cc621b8c44
-
Filesize
224B
MD5d46612f4c4d2af5fb0d23ed56c12d1da
SHA190e0e65d457392d2bf1a9f7fdff6bcf85b459393
SHA256051c11ac2bac1380715078897d3f6b48607bbb189337b757a6995d28650eb3a3
SHA512d2ea46963521f86d2d247df3745d2ecbc46936b2e1dcc4e523ffe1e97d9a46e2ea0e58897724b6f41a08dcc9c6ac3e7264846bf7beba221cacd0fa7e157f1f86
-
Filesize
960KB
MD5bbd7a79cdd1b3561f3e7463503de4a77
SHA11006f89a45426548061518d85d8cd79360877e3c
SHA256b13284bf457705aa8954bf355176832559c1927b2fda394eee287931d5cdff62
SHA512a1a26ad8bc6eeda49790c7fe73500716502b65768ea79ccc2dd6b9a92ac4c71c9cd9b19a99040b87e38540e8bd74f5391cca6809e85634c41b7d6f969747d67c
-
Filesize
876B
MD53a2ac8f6ccf35d815396578fb630a610
SHA12d44fbf928cb480f1d235f57bffbcb9fb7a41918
SHA256f43234325cd01a9a5992ded7a37e2e96876281f1324725534e06a2702084afa2
SHA5128239b0ee8bf713b0817f939ba7659e64ed5ce1f859fd4f128bba9b4cb18357247783aae99c13b14d216ff710efec1d4c73eae393bd183be62a62e235b586ab94
-
Filesize
73KB
MD50e8b8abea4e23ddc9a70614f3f651303
SHA16d332ba4e7a78039f75b211845514ab35ab467b2
SHA25666fc6b68e54b8840a38b4de980cc22aed21009afc1494a9cc68e892329f076a1
SHA5124feded78f9b953472266693e0943030d00f82a5cc8559df60ae0479de281164155e19687afc67cba74d04bb9ad092f5c7732f2d2f9b06274ca2ae87dc2d4a6dc