Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    07-06-2024 22:28

General

  • Target

    72b90c4de9e41f09f76427693806d4d0_NeikiAnalytics.exe

  • Size

    41KB

  • MD5

    72b90c4de9e41f09f76427693806d4d0

  • SHA1

    fe0659c418ed9e658087145e8a810662258f017c

  • SHA256

    34bac02f6bfbb98e315ab426bd0c2d50008d4b7c92eb647fa3270071c101744d

  • SHA512

    4835bc07e575ff6b2d0df2dba425b004f6fd1ed0b944a154f8e48a8f81ebd4f44f2c805f359c18c0a98cb166928bdcd3dc45a885143857b0ce36e465aabb38ec

  • SSDEEP

    768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/:AEwVs+0jNDY1qi/q

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 29 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies system certificate store 2 TTPs 7 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\72b90c4de9e41f09f76427693806d4d0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\72b90c4de9e41f09f76427693806d4d0_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2236
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:1548

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

2
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    9fab6e1fe72b62d9807bbe6ea8e9ef3b

    SHA1

    4610e55dde869a08fde44edd95af6ccce6d9e77b

    SHA256

    35b3df70fcb76f42427266ff098709317aa805c664b57143ab3f29e440ed09fc

    SHA512

    b025babe3a11381e2152ba410a5e042c2235ae02baa2e80f7e37d644e8cd6b25936c6de9b26107c46f5f9a961e09af1d90c2ef89e19c2dbf5c746404464af749

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    a1cb217060e577e9edffe7e4be50d271

    SHA1

    7be2d7539f96606453a22cbab50476294a3dccb2

    SHA256

    719e544b789c4038cecf7cc1fa3c541c510055c87e8c1039f8738aa17167bba5

    SHA512

    8413077612012088739137c5f1a420b3368c2a009f53c6d1284c87ca4750f247d5b335f0e3ae923ee4ba1bc4b5d23f31ea905c5e246c15631a449c39309e960a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    29e82ce41088db886f3adb6f19f0fe09

    SHA1

    bbdad40ea2b72b508009e7a7a82eccea67155f86

    SHA256

    ad87e8f9346e423ecbd47b3d269b19c2175eb74d09d7f8e6bab5440906b57e8e

    SHA512

    ebf080c03479f06791c64923c39656bd8b9e57fe2e3db772984422484a06ee8bd8115d4340da5fba8a7b1dff2d28c74335b8972e9a4966ca237a9e9f7323e15a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    739b9f5fe31f5c0e9a177ca49b71e64c

    SHA1

    2d1698151f6e980ca5cfb35b8ab4efa1120e15ed

    SHA256

    d8f6efc755907b91410351816705221796121dcb2ded53b12a609fa1f1e28847

    SHA512

    60c0e9f0449fd5c3f63f471ba2e9716cd95e6dab8f812368794725c4e8159fed766e8fdcd2362080df1082e2d56de4a62093664f5ed4961b54d2ea3fb141477a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    58d92d121cd31a5b1db55183ca1940b5

    SHA1

    4788d881e24c86c0e975e3a961dfb1895764499e

    SHA256

    4b07f9e14782bb521e525ed51ce7f6f9b119815aeadcb013c13e02384f94981e

    SHA512

    0b516c74342575677fd4b9a7f1d30a9235dd645adb044323fdc5c8ecb3e2a245d5baa4bab1f8f93bedab694390ce0b85b7c75f55a7158faaefbcc8971199f74b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    d9e54f7e466db90b0bc6cb144fc2b35c

    SHA1

    b048e95e10da4db936bcb0deb1921c80aeca3974

    SHA256

    21327c7e71ba56235ce7ea6713084ebc12ce45b6b1d47d39ea1f5d0ef78c0562

    SHA512

    4b7a51e3e59d7ec349599770eee955f01e967ad338c0e49e9ff67d18ed41c68d9fe7346b0f63414b476192ccca33c1ef24577c4897ccec67a275b5cd602ee856

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    300d80d3ba0515e61cd9e0a2672b266d

    SHA1

    ea9ae07c0fedb12b17b991bbdf438726292b318e

    SHA256

    80151c71d770b2dcde19bea355c99001ff0a04d06875809e8836f29712ab0509

    SHA512

    a8ce8da4df5ec1ca26d8b3f5d26110a83d6d87216028be20582235216eecb898b651a4c4c2a9bdb4146b3029797f936cb8fe2709db764405e26bfb6b347c2a60

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    6720f1286e690519d1c25784dd914108

    SHA1

    970993756928f2ec4b0b005895853843085d84b7

    SHA256

    ff35dcc431728348cd402ac136a0b73a9f9ac54a38f756061313830809656b3d

    SHA512

    17bd1a91613b03f29ee5b39e969be1830163aec2573302920cc7ed7bc7500ae0547cae4e1c90ecac5f54944be2bb7477c40a1638913a00f6ff867913863f104b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    aae737dd412f2f00ec44ef3c6d2f7037

    SHA1

    0ba0814c1b0a08418d5f7d9e891dcbf96b3c5f02

    SHA256

    5d82f2ddb051795c8670547e0783c3864bce8691ee7117e029d28be7832af578

    SHA512

    471209038713dd5da2f1c4c969d83f237653c974c54785306bc69154c8ebf030c705ed39da0bf99a210f81aad342b9394759454a653a4e4bc22d0a5f0c9fd234

  • C:\Users\Admin\AppData\Local\Temp\Cab1310.tmp
    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar1323.tmp
    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Users\Admin\AppData\Local\Temp\Tar13D8.tmp
    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\tmp149D.tmp
    Filesize

    41KB

    MD5

    780126464932d5430da254055c269883

    SHA1

    92689b7cfedf6849b76e6b38a5f46424c4fad319

    SHA256

    ff0c1f3230c5cc6552942cf67975e4284a327f0472c35121fab94b686799d9cd

    SHA512

    1e4dba566cbc88e3a76624be749ffa5f7f8e64cd88e0771e7540d6c51579863e1c735878dfd5e0330e63e675225ad61cdd140fab720160d9f3b1b4303876ca1b

  • C:\Users\Admin\AppData\Local\Temp\zincite.log
    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • C:\Users\Admin\AppData\Local\Temp\zincite.log
    Filesize

    160B

    MD5

    1464d2d73a4f47f0584dacc82ace2135

    SHA1

    7999458853976198b43a18f7a00324c3dc85d210

    SHA256

    be9ffb7363494a8e33bcc83885f6b1e48d3e4cd1cbc95a2223dd07bff57de100

    SHA512

    4225963fafadaaf96c7f92d43913312cd805c444b1973c19d127ce272fdeae20ceec8cb5c4a2f43f9ddb30db57620fbc0832da8ec8ee036b38b1f0d6af97f0ae

  • C:\Users\Admin\AppData\Local\Temp\zincite.log
    Filesize

    160B

    MD5

    91fff4c23b2c2505d4c48bbfdcdf11f2

    SHA1

    42c6e011a688d49bdc283bebbff8611fa86ecabe

    SHA256

    2befab36f47472ac984ea61659428334784cd8d33f2ec4220df2c234904017bb

    SHA512

    a77dadd56e1fe251e84b9c8f3b67d05dd6d544847eea96e0a7c9da0f73f750c9aa9bf6954617f7488ca529735e96d7e650524bfea816ab572a9188f69fbc50da

  • C:\Windows\services.exe
    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • memory/1548-31-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/1548-63-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/1548-625-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/1548-67-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/1548-72-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/1548-621-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/1548-74-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/1548-29-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/1548-79-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/1548-11-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/1548-84-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/1548-18-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/1548-61-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/1548-23-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/1548-36-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/2236-78-0x0000000000500000-0x0000000000510200-memory.dmp
    Filesize

    64KB

  • memory/2236-3-0x0000000000500000-0x0000000000510200-memory.dmp
    Filesize

    64KB

  • memory/2236-35-0x0000000000500000-0x0000000000510200-memory.dmp
    Filesize

    64KB

  • memory/2236-24-0x00000000001B0000-0x00000000001B8000-memory.dmp
    Filesize

    32KB

  • memory/2236-60-0x0000000000500000-0x0000000000510200-memory.dmp
    Filesize

    64KB

  • memory/2236-62-0x0000000000500000-0x0000000000510200-memory.dmp
    Filesize

    64KB

  • memory/2236-17-0x0000000000500000-0x0000000000510200-memory.dmp
    Filesize

    64KB

  • memory/2236-10-0x00000000001B0000-0x00000000001B8000-memory.dmp
    Filesize

    32KB

  • memory/2236-83-0x0000000000500000-0x0000000000510200-memory.dmp
    Filesize

    64KB

  • memory/2236-4-0x00000000001B0000-0x00000000001B8000-memory.dmp
    Filesize

    32KB

  • memory/2236-620-0x0000000000500000-0x0000000000510200-memory.dmp
    Filesize

    64KB

  • memory/2236-73-0x0000000000500000-0x0000000000510200-memory.dmp
    Filesize

    64KB

  • memory/2236-66-0x0000000000500000-0x0000000000510200-memory.dmp
    Filesize

    64KB