Analysis
-
max time kernel
14s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06-06-2024 17:22
Static task
static1
Behavioral task
behavioral1
Sample
8ababd15827227492bd83e9e18f13840_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8ababd15827227492bd83e9e18f13840_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
8ababd15827227492bd83e9e18f13840_NeikiAnalytics.exe
-
Size
308KB
-
MD5
8ababd15827227492bd83e9e18f13840
-
SHA1
5a41dc28870ea063ce02b8c8444afe686e893fd2
-
SHA256
21fe042cd2fd349edaa03e336f0ce9eaae9ba4e66823f4065dc94ad5e3127e88
-
SHA512
f2be67808648e28384065769b9fd777e5fc6d18c90755950bfefbf78bbbb2185523da24022da3f836fb5554df456485cc32c224814a8c95073804eb3ac9a608a
-
SSDEEP
3072:/c3sBG7mXh7m/zZM3jAbNOM6CNtDCZFL:E3sBz0Z4Mj72F
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
Processes:
resource yara_rule behavioral1/memory/7504-147853-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 -
Processes:
resource yara_rule behavioral1/memory/99872-73923-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/99872-73924-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/99872-73920-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/99872-73925-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/99872-73918-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/99872-83627-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/7504-147840-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/99872-147847-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/31992-147834-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/31992-147852-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/7504-147853-0x0000000000400000-0x0000000000414000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
8ababd15827227492bd83e9e18f13840_NeikiAnalytics.exepid process 2020 8ababd15827227492bd83e9e18f13840_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ababd15827227492bd83e9e18f13840_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\8ababd15827227492bd83e9e18f13840_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\8ababd15827227492bd83e9e18f13840_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\8ababd15827227492bd83e9e18f13840_NeikiAnalytics.exe"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\OSYEF.bat" "3⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Win Pdf" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe" /f4⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"3⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"4⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exe"4⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\OSYEF.batFilesize
145B
MD54eb61ec7816c34ec8c125acadc57ec1b
SHA1b0015cc865c0bb1a027be663027d3829401a31cc
SHA25608375cdb2e9819391f67f71e9718c15b48d3eaa452c54bd8fdd1f6a42e899aff
SHA512f289f01d996dd643560370be8cdf8894e9a676ca3813f706c01ef5d705b9b18246c6cadf10d96edd433a616637b8a78fbd23c5738e76f1c4e671977b6d0cb6c1
-
C:\Users\Admin\AppData\Roaming\Microsoft\csrsll.exeFilesize
308KB
MD5ca864483ffc2e9472b676ffeaad8a421
SHA1c3016034433f6402d4f23c410fecdfc0c8467a46
SHA2566b002daa4ac1c17b63267c2459915744d0ab02738fbc3608f194808858ff9ef5
SHA5121861476d29730da0d4e5409fad27e17997a1a85450a311e7140c55dcd7902bc22198493b3ae38f44e7e71b65aa45952d71322272f5f19501ecb46376cfd782ed
-
memory/2020-0-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/2020-3-0x00000000003B0000-0x00000000003B1000-memory.dmpFilesize
4KB
-
memory/7504-147853-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/7504-147840-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/31992-147852-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/31992-147834-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/99872-73916-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/99872-73918-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/99872-73925-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/99872-83627-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/99872-73920-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/99872-147847-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/99872-73924-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/99872-73922-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/99872-73923-0x0000000000400000-0x000000000040B000-memory.dmpFilesize
44KB
-
memory/100184-73965-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB