Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    08-06-2024 01:03

General

  • Target

    7dfdd8149cbf0b57f2b8b803ce43ba90_NeikiAnalytics.exe

  • Size

    29KB

  • MD5

    7dfdd8149cbf0b57f2b8b803ce43ba90

  • SHA1

    9d3cb8fbf4ace0c70dbf18dd7435ba53222ba664

  • SHA256

    feeb59fa18f642ea87d26133ceda774b053c51eaf97b0316c4e2e3782c0ce268

  • SHA512

    991b3c491d04c7057f7f3578b259b1419603c4a354b848c0c1b046ba1bccb1dc851476a16613b9019ed47e9ca034357a879e8159c0132ce4a7a13a20432f0ba3

  • SSDEEP

    768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/b:AEwVs+0jNDY1qi/qz

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 28 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7dfdd8149cbf0b57f2b8b803ce43ba90_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\7dfdd8149cbf0b57f2b8b803ce43ba90_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2168
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:2300

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

2
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    bd927b2d242b495131058dc0b1bd0237

    SHA1

    855a450c3ea0db3289af20e7d08c0452e4e6f973

    SHA256

    3133a0ecd0883185ccbf311c2d684e380453ee9959802aec0175ce5fe796f01b

    SHA512

    8c618a1b7097fb7df3d95c555afe8b165e6140302e8537cc8ac8beb78cba7a1b2c3597709e3cbde5bc761fe8a8a7084c6c9a940f36aa93a8ce2a3f7f05185d07

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    fd33b768eb18f0a7ca3b27da003c95ed

    SHA1

    37dd6d4c935fb26c10628f08508be7e81c2db8eb

    SHA256

    3434bada2c3b365847c5e84bf565b40bf584f0c2fc1eb8039c4ec921b1e1b95f

    SHA512

    feb2b0a06e842a3787c6436066823d89fdca7efb3d84ae66709fd34f0d3998f14e01b95f3b697aeb079094f25eda6fc57b1cdd794a283aab58ed97bd27c9f830

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    b205f3a32cbbb317ff5e58576f3a86a4

    SHA1

    4c1425c60a40a48d1948b22f8787434dcb1ff718

    SHA256

    a0120cadb4629bae4cb3395fe644b569d05c08214c20bb392dcda8579c7092aa

    SHA512

    fc97cd49a99c68b8b8a6c085bc43678f66c32453356e68909554a6b8b4f840dd2158539abd37423b30d8fe8145d0932dcf8e2a6dfe1f52c00645670bf146e903

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    bfb9039bbffa177a798f5e87fd03591e

    SHA1

    f9ff3e9dcdad47dfca632a9e91cc2d101564c00c

    SHA256

    9d7e27d3086e5eb909d78f6ea85c440efbdd151342285aa926b31b80a04deecd

    SHA512

    6ea3aec3376b297d2fcba6794701699bb994f63d596b9b4e2910cbba44e4c14cb8d3cefbb21f87c6957fef6af04a8416927239f713f2865cb08843d3666c09b9

  • C:\Users\Admin\AppData\Local\Temp\Cab996E.tmp
    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar996F.tmp
    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Users\Admin\AppData\Local\Temp\Tar9B1A.tmp
    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\tmp9215.tmp
    Filesize

    29KB

    MD5

    7dfdd8149cbf0b57f2b8b803ce43ba90

    SHA1

    9d3cb8fbf4ace0c70dbf18dd7435ba53222ba664

    SHA256

    feeb59fa18f642ea87d26133ceda774b053c51eaf97b0316c4e2e3782c0ce268

    SHA512

    991b3c491d04c7057f7f3578b259b1419603c4a354b848c0c1b046ba1bccb1dc851476a16613b9019ed47e9ca034357a879e8159c0132ce4a7a13a20432f0ba3

  • C:\Users\Admin\AppData\Local\Temp\zincite.log
    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • C:\Users\Admin\AppData\Local\Temp\zincite.log
    Filesize

    352B

    MD5

    115e19b4fe8d7f8e3162f08e9ccfe831

    SHA1

    b46ef9a1d28092c03713aadc15abda1f21541811

    SHA256

    d8f6ea44fb5ff62ea3e00749d832385306abe4cedde87383e232a0b23c7ea4c0

    SHA512

    520c09474562043f1a2a825f8a9faab8d973e457c478b42c43494ab282b3876701a792045ffe30cf96ffbb4a2ef6812a0c02f88c3583b62cd72060e90e0aea13

  • C:\Users\Admin\AppData\Local\Temp\zincite.log
    Filesize

    352B

    MD5

    ab4aba2910e895ae3bd10786bffc610e

    SHA1

    6aef4a8df1ab086224df17145fd54414ac011b9a

    SHA256

    7632ece9546fd82be0a241163e544ea42b765275cb2350b39404a9d7a5edd8c3

    SHA512

    33a41ab028d64e811a855ddffc253e167b490bd2c300e25bc90c7854c5b470f1135b7e2e1e0d030ada0d155f32bd82dd639fcbcde1e555a3942b075ca0e2c1ff

  • C:\Windows\services.exe
    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • memory/2168-40-0x0000000000500000-0x0000000000510200-memory.dmp
    Filesize

    64KB

  • memory/2168-16-0x0000000000500000-0x0000000000510200-memory.dmp
    Filesize

    64KB

  • memory/2168-42-0x0000000000500000-0x0000000000510200-memory.dmp
    Filesize

    64KB

  • memory/2168-24-0x0000000000220000-0x0000000000228000-memory.dmp
    Filesize

    32KB

  • memory/2168-412-0x0000000000500000-0x0000000000510200-memory.dmp
    Filesize

    64KB

  • memory/2168-83-0x0000000000500000-0x0000000000510200-memory.dmp
    Filesize

    64KB

  • memory/2168-66-0x0000000000500000-0x0000000000510200-memory.dmp
    Filesize

    64KB

  • memory/2168-21-0x0000000000220000-0x0000000000228000-memory.dmp
    Filesize

    32KB

  • memory/2168-71-0x0000000000500000-0x0000000000510200-memory.dmp
    Filesize

    64KB

  • memory/2168-4-0x0000000000220000-0x0000000000228000-memory.dmp
    Filesize

    32KB

  • memory/2168-73-0x0000000000500000-0x0000000000510200-memory.dmp
    Filesize

    64KB

  • memory/2168-0-0x0000000000500000-0x0000000000510200-memory.dmp
    Filesize

    64KB

  • memory/2168-78-0x0000000000500000-0x0000000000510200-memory.dmp
    Filesize

    64KB

  • memory/2300-29-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/2300-79-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/2300-84-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/2300-86-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/2300-74-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/2300-72-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/2300-67-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/2300-43-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/2300-41-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/2300-36-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/2300-31-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/2300-23-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/2300-17-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/2300-413-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/2300-10-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB