Malware Analysis Report

2024-07-28 08:34

Sample ID 240608-behynaeg5t
Target 7dfdd8149cbf0b57f2b8b803ce43ba90_NeikiAnalytics.exe
SHA256 feeb59fa18f642ea87d26133ceda774b053c51eaf97b0316c4e2e3782c0ce268
Tags
microsoft persistence phishing product:outlook upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

feeb59fa18f642ea87d26133ceda774b053c51eaf97b0316c4e2e3782c0ce268

Threat Level: Known bad

The file 7dfdd8149cbf0b57f2b8b803ce43ba90_NeikiAnalytics.exe was found to be: Known bad.

Malicious Activity Summary

microsoft persistence phishing product:outlook upx

Detected microsoft outlook phishing page

Executes dropped EXE

UPX packed file

Adds Run key to start application

Drops file in Windows directory

Unsigned PE

Suspicious use of WriteProcessMemory

Modifies system certificate store

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-08 01:03

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-08 01:03

Reported

2024-06-08 01:05

Platform

win10v2004-20240508-en

Max time kernel

150s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\7dfdd8149cbf0b57f2b8b803ce43ba90_NeikiAnalytics.exe"

Signatures

Detected microsoft outlook phishing page

phishing microsoft product:outlook

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\services.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" C:\Users\Admin\AppData\Local\Temp\7dfdd8149cbf0b57f2b8b803ce43ba90_NeikiAnalytics.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" C:\Windows\services.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\services.exe C:\Users\Admin\AppData\Local\Temp\7dfdd8149cbf0b57f2b8b803ce43ba90_NeikiAnalytics.exe N/A
File opened for modification C:\Windows\java.exe C:\Users\Admin\AppData\Local\Temp\7dfdd8149cbf0b57f2b8b803ce43ba90_NeikiAnalytics.exe N/A
File created C:\Windows\java.exe C:\Users\Admin\AppData\Local\Temp\7dfdd8149cbf0b57f2b8b803ce43ba90_NeikiAnalytics.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\7dfdd8149cbf0b57f2b8b803ce43ba90_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\7dfdd8149cbf0b57f2b8b803ce43ba90_NeikiAnalytics.exe"

C:\Windows\services.exe

"C:\Windows\services.exe"

Network

Country Destination Domain Proto
N/A 10.213.60.59:1034 tcp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 136.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
N/A 192.168.2.157:1034 tcp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
N/A 10.11.161.112:1034 tcp
N/A 192.168.2.16:1034 tcp
N/A 10.65.120.153:1034 tcp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
N/A 10.126.94.178:1034 tcp
US 8.8.8.8:53 m-ou.se udp
US 8.8.8.8:53 aspmx.l.google.com udp
NL 142.250.102.27:25 aspmx.l.google.com tcp
US 8.8.8.8:53 acm.org udp
US 8.8.8.8:53 mail.mailroute.net udp
US 199.89.1.120:25 mail.mailroute.net tcp
US 8.8.8.8:53 cs.stanford.edu udp
US 8.8.8.8:53 smtp1.cs.stanford.edu udp
US 171.64.64.25:25 smtp1.cs.stanford.edu tcp
US 8.8.8.8:53 burtleburtle.net udp
US 171.64.64.25:25 smtp1.cs.stanford.edu tcp
US 8.8.8.8:53 mx.burtleburtle.net udp
US 8.8.8.8:53 alumni.caltech.edu udp
US 65.254.254.52:25 mx.burtleburtle.net tcp
US 8.8.8.8:53 alumni-caltech-edu.mail.protection.outlook.com udp
US 52.101.11.19:25 alumni-caltech-edu.mail.protection.outlook.com tcp
US 8.8.8.8:53 gzip.org udp
US 8.8.8.8:53 gzip.org udp
US 85.187.148.2:25 gzip.org tcp
US 8.8.8.8:53 search.yahoo.com udp
IE 212.82.100.137:80 search.yahoo.com tcp
US 8.8.8.8:53 search.lycos.com udp
IE 212.82.100.137:443 search.yahoo.com tcp
US 8.8.8.8:53 www.google.com udp
FR 216.58.215.36:80 www.google.com tcp
US 209.202.254.10:80 search.lycos.com tcp
FR 216.58.215.36:80 www.google.com tcp
US 209.202.254.10:80 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
IE 212.82.100.137:80 search.yahoo.com tcp
IE 212.82.100.137:443 search.yahoo.com tcp
US 8.8.8.8:53 137.100.82.212.in-addr.arpa udp
US 8.8.8.8:53 11.97.55.23.in-addr.arpa udp
US 8.8.8.8:53 10.254.202.209.in-addr.arpa udp
US 8.8.8.8:53 www.altavista.com udp
IE 212.82.100.137:80 www.altavista.com tcp
IE 212.82.100.137:80 www.altavista.com tcp
IE 212.82.100.137:80 www.altavista.com tcp
IE 212.82.100.137:80 www.altavista.com tcp
IE 212.82.100.137:80 www.altavista.com tcp
IE 212.82.100.137:443 www.altavista.com tcp
US 8.8.8.8:53 74.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 36.215.58.216.in-addr.arpa udp
US 209.202.254.10:80 search.lycos.com tcp
US 209.202.254.10:80 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
IE 212.82.100.137:80 www.altavista.com tcp
IE 212.82.100.137:443 www.altavista.com tcp
US 209.202.254.10:443 search.lycos.com tcp
US 209.202.254.10:80 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
IE 212.82.100.137:80 www.altavista.com tcp
IE 212.82.100.137:443 www.altavista.com tcp
US 8.8.8.8:53 snai1mai1.com udp
US 8.8.8.8:53 snai1mai1.com udp
IE 212.82.100.137:443 www.altavista.com tcp
IE 212.82.100.137:80 www.altavista.com tcp
US 209.202.254.10:80 search.lycos.com tcp
FR 216.58.215.36:443 www.google.com tcp
IE 212.82.100.137:443 www.altavista.com tcp
IE 212.82.100.137:443 www.altavista.com tcp
US 209.202.254.10:443 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
US 8.8.8.8:53 163.20.217.172.in-addr.arpa udp
FR 216.58.215.36:80 www.google.com tcp
FR 216.58.215.36:443 www.google.com tcp
US 209.202.254.10:443 search.lycos.com tcp
FR 216.58.215.36:443 www.google.com tcp
US 209.202.254.10:443 search.lycos.com tcp
US 8.8.8.8:53 stanford.edu udp
US 8.8.8.8:53 mxb-00000d07.gslb.pphosted.com udp
US 67.231.157.125:25 mxb-00000d07.gslb.pphosted.com tcp
US 209.202.254.10:443 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
N/A 172.16.1.154:1034 tcp
US 8.8.8.8:53 alt1.aspmx.l.google.com udp
NL 142.251.9.26:25 alt1.aspmx.l.google.com tcp
US 8.8.8.8:53 acm.org udp
US 104.17.78.30:25 acm.org tcp
US 8.8.8.8:53 smtp2.cs.stanford.edu udp
US 171.64.64.26:25 smtp2.cs.stanford.edu tcp
US 171.64.64.26:25 smtp2.cs.stanford.edu tcp
US 8.8.8.8:53 burtleburtle.net udp
US 8.8.8.8:53 alumni.caltech.edu udp
US 85.187.148.2:25 gzip.org tcp
US 75.2.70.75:25 alumni.caltech.edu tcp
US 65.254.227.224:25 burtleburtle.net tcp
US 8.8.8.8:53 mxa-00000d07.gslb.pphosted.com udp
US 67.231.149.169:25 mxa-00000d07.gslb.pphosted.com tcp
N/A 192.168.2.12:1034 tcp

Files

memory/2920-0-0x0000000000500000-0x0000000000510200-memory.dmp

C:\Windows\services.exe

MD5 b0fe74719b1b647e2056641931907f4a
SHA1 e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256 bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA512 9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

memory/4476-7-0x0000000000400000-0x0000000000408000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\zincite.log

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

memory/2920-13-0x0000000000500000-0x0000000000510200-memory.dmp

memory/4476-14-0x0000000000400000-0x0000000000408000-memory.dmp

memory/4476-19-0x0000000000400000-0x0000000000408000-memory.dmp

memory/4476-24-0x0000000000400000-0x0000000000408000-memory.dmp

memory/4476-26-0x0000000000400000-0x0000000000408000-memory.dmp

memory/4476-31-0x0000000000400000-0x0000000000408000-memory.dmp

memory/4476-36-0x0000000000400000-0x0000000000408000-memory.dmp

memory/4476-38-0x0000000000400000-0x0000000000408000-memory.dmp

memory/4476-43-0x0000000000400000-0x0000000000408000-memory.dmp

memory/4476-48-0x0000000000400000-0x0000000000408000-memory.dmp

memory/4476-50-0x0000000000400000-0x0000000000408000-memory.dmp

memory/2920-54-0x0000000000500000-0x0000000000510200-memory.dmp

memory/4476-55-0x0000000000400000-0x0000000000408000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\zincite.log

MD5 816228d610031e10349bce4595b33731
SHA1 633ffff8e068bd2fe3047364648d5c4738401921
SHA256 ea6a399fc34c8b63305059174e2dcaf20836016a1ed2a1f2a91799bb41fd2caa
SHA512 bae0c50889eb6624bb60eb6507ad1bc01339c5e3942b2c253ca9d084a964ac02c9b93d684b0cf73fb33ff9d99abaa4ec8d5ed93f21bb20134a8f46c66a4a7d13

C:\Users\Admin\AppData\Local\Temp\tmp386B.tmp

MD5 fa7226f1e8061f25578e28e9dc160a62
SHA1 4dafbf19f795ba837394d0b2d624166583515ddc
SHA256 89d0d3665d985ddffc5187e3e931cf3200cb1fed5df78a6248fed61ad5fbe4bc
SHA512 9d480db05b7cf8dc0b1160ec07473a97aaf78251cdd78eae6ceef093128d53a6b9f3603df6da96c20d70c8350a23b4274dcc60a822f96645bae6f2a907347003

memory/2920-124-0x0000000000500000-0x0000000000510200-memory.dmp

memory/4476-125-0x0000000000400000-0x0000000000408000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\J2J1W33T\search[2].htm

MD5 8ba61a16b71609a08bfa35bc213fce49
SHA1 8374dddcc6b2ede14b0ea00a5870a11b57ced33f
SHA256 6aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1
SHA512 5855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1

C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\J2J1W33T\search[3].htm

MD5 e250ef8a23110c519ee4203636c05ca9
SHA1 e7ad4d2f4758c657e5fd37923a625c8843191b4c
SHA256 285bd4fd4a27a09c7e2782455b757844273f244a00369e9962382a79d3b7f472
SHA512 407b5d93420029d05d1d5895d9a7971e4676c45404ed42a56104ab02edab298d21658c6add170eb671b3195739d1a29c25b7b2e27a9b2527dbb323cdc3be2726

memory/2920-234-0x0000000000500000-0x0000000000510200-memory.dmp

memory/4476-235-0x0000000000400000-0x0000000000408000-memory.dmp

memory/2920-238-0x0000000000500000-0x0000000000510200-memory.dmp

memory/4476-239-0x0000000000400000-0x0000000000408000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-08 01:03

Reported

2024-06-08 01:05

Platform

win7-20240221-en

Max time kernel

150s

Max time network

155s

Command Line

"C:\Users\Admin\AppData\Local\Temp\7dfdd8149cbf0b57f2b8b803ce43ba90_NeikiAnalytics.exe"

Signatures

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\services.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" C:\Users\Admin\AppData\Local\Temp\7dfdd8149cbf0b57f2b8b803ce43ba90_NeikiAnalytics.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" C:\Windows\services.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\java.exe C:\Users\Admin\AppData\Local\Temp\7dfdd8149cbf0b57f2b8b803ce43ba90_NeikiAnalytics.exe N/A
File created C:\Windows\java.exe C:\Users\Admin\AppData\Local\Temp\7dfdd8149cbf0b57f2b8b803ce43ba90_NeikiAnalytics.exe N/A
File created C:\Windows\services.exe C:\Users\Admin\AppData\Local\Temp\7dfdd8149cbf0b57f2b8b803ce43ba90_NeikiAnalytics.exe N/A

Modifies system certificate store

evasion spyware trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 C:\Users\Admin\AppData\Local\Temp\7dfdd8149cbf0b57f2b8b803ce43ba90_NeikiAnalytics.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 C:\Users\Admin\AppData\Local\Temp\7dfdd8149cbf0b57f2b8b803ce43ba90_NeikiAnalytics.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 C:\Users\Admin\AppData\Local\Temp\7dfdd8149cbf0b57f2b8b803ce43ba90_NeikiAnalytics.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 C:\Users\Admin\AppData\Local\Temp\7dfdd8149cbf0b57f2b8b803ce43ba90_NeikiAnalytics.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\7dfdd8149cbf0b57f2b8b803ce43ba90_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\7dfdd8149cbf0b57f2b8b803ce43ba90_NeikiAnalytics.exe"

C:\Windows\services.exe

"C:\Windows\services.exe"

Network

Country Destination Domain Proto
N/A 10.213.60.59:1034 tcp
N/A 192.168.2.157:1034 tcp
N/A 10.11.161.112:1034 tcp
N/A 192.168.2.16:1034 tcp
US 8.8.8.8:53 alumni.caltech.edu udp
US 8.8.8.8:53 alumni-caltech-edu.mail.protection.outlook.com udp
US 8.8.8.8:53 gzip.org udp
US 8.8.8.8:53 gzip.org udp
US 52.101.40.6:25 alumni-caltech-edu.mail.protection.outlook.com tcp
US 85.187.148.2:25 gzip.org tcp
N/A 10.65.120.153:1034 tcp
US 8.8.8.8:53 alumni.caltech.edu udp
US 75.2.70.75:25 alumni.caltech.edu tcp
US 85.187.148.2:25 gzip.org tcp
N/A 10.126.94.178:1034 tcp
US 8.8.8.8:53 mx.alumni.caltech.edu udp
US 8.8.8.8:53 mx.gzip.org udp
US 8.8.8.8:53 mail.alumni.caltech.edu udp
US 8.8.8.8:53 smtp.alumni.caltech.edu udp
US 8.8.8.8:53 mail.gzip.org udp
US 85.187.148.2:25 mail.gzip.org tcp
N/A 172.16.1.154:1034 tcp
US 8.8.8.8:53 apple.com udp
US 8.8.8.8:53 mx-in.g.apple.com udp
US 17.57.170.2:25 mx-in.g.apple.com tcp
US 8.8.8.8:53 unicode.org udp
US 8.8.8.8:53 aspmx.l.google.com udp
NL 142.250.102.27:25 aspmx.l.google.com tcp
US 8.8.8.8:53 www.google.com udp
FR 216.58.215.36:80 www.google.com tcp
FR 216.58.215.36:80 www.google.com tcp
FR 216.58.215.36:443 www.google.com tcp
FR 216.58.215.36:443 www.google.com tcp
US 8.8.8.8:53 search.lycos.com udp
US 8.8.8.8:53 smtp.gzip.org udp
US 209.202.254.10:80 search.lycos.com tcp
US 209.202.254.10:80 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
US 8.8.8.8:53 apps.identrust.com udp
US 8.8.8.8:53 www.altavista.com udp
US 8.8.8.8:53 apps.identrust.com udp
BE 23.14.90.73:80 apps.identrust.com tcp
IE 212.82.100.137:80 www.altavista.com tcp
BE 23.14.90.73:80 apps.identrust.com tcp
FR 216.58.215.36:80 www.google.com tcp
FR 216.58.215.36:443 www.google.com tcp
US 8.8.8.8:53 lists.postgresql.org udp
US 8.8.8.8:53 lists.fedoraproject.org udp
US 8.8.8.8:53 magus.postgresql.org udp
US 85.187.148.2:25 mail.gzip.org tcp
US 85.187.148.2:25 mail.gzip.org tcp
US 8.8.8.8:53 smtp-mm-ib01.fedoraproject.org udp
US 8.8.8.8:53 spark.apache.org udp
FR 216.58.215.36:80 www.google.com tcp
US 152.19.134.143:25 smtp-mm-ib01.fedoraproject.org tcp
US 8.8.8.8:53 mx1-ec2-va.apache.org udp
NO 87.238.57.229:25 magus.postgresql.org tcp
US 34.199.147.133:25 mx1-ec2-va.apache.org tcp
FR 216.58.215.36:80 www.google.com tcp
US 209.202.254.10:80 search.lycos.com tcp
FR 216.58.215.36:443 www.google.com tcp
FR 216.58.215.36:443 www.google.com tcp
US 209.202.254.10:443 search.lycos.com tcp
US 209.202.254.10:443 search.lycos.com tcp
US 8.8.8.8:53 duke.edu udp
US 8.8.8.8:53 mx.oit.duke.edu udp
US 152.3.72.25:25 mx.oit.duke.edu tcp
N/A 192.168.2.12:1034 tcp

Files

memory/2168-0-0x0000000000500000-0x0000000000510200-memory.dmp

memory/2168-4-0x0000000000220000-0x0000000000228000-memory.dmp

C:\Windows\services.exe

MD5 b0fe74719b1b647e2056641931907f4a
SHA1 e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256 bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA512 9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

memory/2300-10-0x0000000000400000-0x0000000000408000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\zincite.log

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

memory/2168-16-0x0000000000500000-0x0000000000510200-memory.dmp

memory/2300-17-0x0000000000400000-0x0000000000408000-memory.dmp

memory/2168-21-0x0000000000220000-0x0000000000228000-memory.dmp

memory/2300-23-0x0000000000400000-0x0000000000408000-memory.dmp

memory/2168-24-0x0000000000220000-0x0000000000228000-memory.dmp

memory/2300-29-0x0000000000400000-0x0000000000408000-memory.dmp

memory/2300-31-0x0000000000400000-0x0000000000408000-memory.dmp

memory/2300-36-0x0000000000400000-0x0000000000408000-memory.dmp

memory/2168-40-0x0000000000500000-0x0000000000510200-memory.dmp

memory/2300-41-0x0000000000400000-0x0000000000408000-memory.dmp

memory/2168-42-0x0000000000500000-0x0000000000510200-memory.dmp

memory/2300-43-0x0000000000400000-0x0000000000408000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\zincite.log

MD5 115e19b4fe8d7f8e3162f08e9ccfe831
SHA1 b46ef9a1d28092c03713aadc15abda1f21541811
SHA256 d8f6ea44fb5ff62ea3e00749d832385306abe4cedde87383e232a0b23c7ea4c0
SHA512 520c09474562043f1a2a825f8a9faab8d973e457c478b42c43494ab282b3876701a792045ffe30cf96ffbb4a2ef6812a0c02f88c3583b62cd72060e90e0aea13

C:\Users\Admin\AppData\Local\Temp\tmp9215.tmp

MD5 7dfdd8149cbf0b57f2b8b803ce43ba90
SHA1 9d3cb8fbf4ace0c70dbf18dd7435ba53222ba664
SHA256 feeb59fa18f642ea87d26133ceda774b053c51eaf97b0316c4e2e3782c0ce268
SHA512 991b3c491d04c7057f7f3578b259b1419603c4a354b848c0c1b046ba1bccb1dc851476a16613b9019ed47e9ca034357a879e8159c0132ce4a7a13a20432f0ba3

memory/2168-66-0x0000000000500000-0x0000000000510200-memory.dmp

memory/2300-67-0x0000000000400000-0x0000000000408000-memory.dmp

memory/2168-71-0x0000000000500000-0x0000000000510200-memory.dmp

memory/2300-72-0x0000000000400000-0x0000000000408000-memory.dmp

memory/2168-73-0x0000000000500000-0x0000000000510200-memory.dmp

memory/2300-74-0x0000000000400000-0x0000000000408000-memory.dmp

memory/2168-78-0x0000000000500000-0x0000000000510200-memory.dmp

memory/2300-79-0x0000000000400000-0x0000000000408000-memory.dmp

memory/2168-83-0x0000000000500000-0x0000000000510200-memory.dmp

memory/2300-84-0x0000000000400000-0x0000000000408000-memory.dmp

memory/2300-86-0x0000000000400000-0x0000000000408000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\zincite.log

MD5 ab4aba2910e895ae3bd10786bffc610e
SHA1 6aef4a8df1ab086224df17145fd54414ac011b9a
SHA256 7632ece9546fd82be0a241163e544ea42b765275cb2350b39404a9d7a5edd8c3
SHA512 33a41ab028d64e811a855ddffc253e167b490bd2c300e25bc90c7854c5b470f1135b7e2e1e0d030ada0d155f32bd82dd639fcbcde1e555a3942b075ca0e2c1ff

C:\Users\Admin\AppData\Local\Temp\Cab996E.tmp

MD5 ac05d27423a85adc1622c714f2cb6184
SHA1 b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256 c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA512 6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

C:\Users\Admin\AppData\Local\Temp\Tar996F.tmp

MD5 9c0c641c06238516f27941aa1166d427
SHA1 64cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA256 4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512 936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 bd927b2d242b495131058dc0b1bd0237
SHA1 855a450c3ea0db3289af20e7d08c0452e4e6f973
SHA256 3133a0ecd0883185ccbf311c2d684e380453ee9959802aec0175ce5fe796f01b
SHA512 8c618a1b7097fb7df3d95c555afe8b165e6140302e8537cc8ac8beb78cba7a1b2c3597709e3cbde5bc761fe8a8a7084c6c9a940f36aa93a8ce2a3f7f05185d07

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

C:\Users\Admin\AppData\Local\Temp\Tar9B1A.tmp

MD5 4ea6026cf93ec6338144661bf1202cd1
SHA1 a1dec9044f750ad887935a01430bf49322fbdcb7
SHA256 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA512 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 fd33b768eb18f0a7ca3b27da003c95ed
SHA1 37dd6d4c935fb26c10628f08508be7e81c2db8eb
SHA256 3434bada2c3b365847c5e84bf565b40bf584f0c2fc1eb8039c4ec921b1e1b95f
SHA512 feb2b0a06e842a3787c6436066823d89fdca7efb3d84ae66709fd34f0d3998f14e01b95f3b697aeb079094f25eda6fc57b1cdd794a283aab58ed97bd27c9f830

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 b205f3a32cbbb317ff5e58576f3a86a4
SHA1 4c1425c60a40a48d1948b22f8787434dcb1ff718
SHA256 a0120cadb4629bae4cb3395fe644b569d05c08214c20bb392dcda8579c7092aa
SHA512 fc97cd49a99c68b8b8a6c085bc43678f66c32453356e68909554a6b8b4f840dd2158539abd37423b30d8fe8145d0932dcf8e2a6dfe1f52c00645670bf146e903

memory/2168-412-0x0000000000500000-0x0000000000510200-memory.dmp

memory/2300-413-0x0000000000400000-0x0000000000408000-memory.dmp

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 bfb9039bbffa177a798f5e87fd03591e
SHA1 f9ff3e9dcdad47dfca632a9e91cc2d101564c00c
SHA256 9d7e27d3086e5eb909d78f6ea85c440efbdd151342285aa926b31b80a04deecd
SHA512 6ea3aec3376b297d2fcba6794701699bb994f63d596b9b4e2910cbba44e4c14cb8d3cefbb21f87c6957fef6af04a8416927239f713f2865cb08843d3666c09b9