Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
08/06/2024, 14:37
Static task
static1
Behavioral task
behavioral1
Sample
3db5b5bfb3b1895d0f588f21a56a6cf0_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
3db5b5bfb3b1895d0f588f21a56a6cf0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
3db5b5bfb3b1895d0f588f21a56a6cf0_NeikiAnalytics.exe
-
Size
95KB
-
MD5
3db5b5bfb3b1895d0f588f21a56a6cf0
-
SHA1
5daff830c0efe149a73233cdf81fa7be4ddaf835
-
SHA256
c432cfcfbfc7f44056ef3aec4ac951fdbc753439647a0e2b835bab297a83b6f3
-
SHA512
c2147f1dd2a2767561144cf166b83938a5448df24277da30834f099b7886ce06bed7ffc43803f8bedb08727565d10ad43c59b0d297cdd7276a19abef20e62d09
-
SSDEEP
1536:EGqRGbQHSgOTw1BFxnsUdsdBhMgxRFy2kckEUEVvccRPAAXLSYPph/ATvYSByU6N:lbjgjXxdWBhMwRFy2Rk/kcIAebPph/Au
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2616 WScript.exe -
Executes dropped EXE 2 IoCs
pid Process 2804 rMX.exe 2284 rMX.exe.exe -
Loads dropped DLL 4 IoCs
pid Process 2940 3db5b5bfb3b1895d0f588f21a56a6cf0_NeikiAnalytics.exe 2940 3db5b5bfb3b1895d0f588f21a56a6cf0_NeikiAnalytics.exe 2580 cmd.exe 2580 cmd.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created \??\c:\windows\rMX.exe.bat rMX.exe File created C:\WINDOWS\VWFLH\rMX.exe.exe rMX.exe File opened for modification C:\WINDOWS\VWFLH\rMX.exe.exe rMX.exe File opened for modification \??\c:\windows\nk.txt cmd.exe File created C:\WINDOWS\VWFLH\rMX.exe 3db5b5bfb3b1895d0f588f21a56a6cf0_NeikiAnalytics.exe File opened for modification C:\WINDOWS\VWFLH\rMX.exe 3db5b5bfb3b1895d0f588f21a56a6cf0_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2940 wrote to memory of 2804 2940 3db5b5bfb3b1895d0f588f21a56a6cf0_NeikiAnalytics.exe 28 PID 2940 wrote to memory of 2804 2940 3db5b5bfb3b1895d0f588f21a56a6cf0_NeikiAnalytics.exe 28 PID 2940 wrote to memory of 2804 2940 3db5b5bfb3b1895d0f588f21a56a6cf0_NeikiAnalytics.exe 28 PID 2940 wrote to memory of 2804 2940 3db5b5bfb3b1895d0f588f21a56a6cf0_NeikiAnalytics.exe 28 PID 2804 wrote to memory of 2980 2804 rMX.exe 29 PID 2804 wrote to memory of 2980 2804 rMX.exe 29 PID 2804 wrote to memory of 2980 2804 rMX.exe 29 PID 2804 wrote to memory of 2980 2804 rMX.exe 29 PID 2804 wrote to memory of 2580 2804 rMX.exe 30 PID 2804 wrote to memory of 2580 2804 rMX.exe 30 PID 2804 wrote to memory of 2580 2804 rMX.exe 30 PID 2804 wrote to memory of 2580 2804 rMX.exe 30 PID 2940 wrote to memory of 2656 2940 3db5b5bfb3b1895d0f588f21a56a6cf0_NeikiAnalytics.exe 31 PID 2940 wrote to memory of 2656 2940 3db5b5bfb3b1895d0f588f21a56a6cf0_NeikiAnalytics.exe 31 PID 2940 wrote to memory of 2656 2940 3db5b5bfb3b1895d0f588f21a56a6cf0_NeikiAnalytics.exe 31 PID 2940 wrote to memory of 2656 2940 3db5b5bfb3b1895d0f588f21a56a6cf0_NeikiAnalytics.exe 31 PID 2580 wrote to memory of 2284 2580 cmd.exe 35 PID 2580 wrote to memory of 2284 2580 cmd.exe 35 PID 2580 wrote to memory of 2284 2580 cmd.exe 35 PID 2580 wrote to memory of 2284 2580 cmd.exe 35 PID 2284 wrote to memory of 2552 2284 rMX.exe.exe 36 PID 2284 wrote to memory of 2552 2284 rMX.exe.exe 36 PID 2284 wrote to memory of 2552 2284 rMX.exe.exe 36 PID 2284 wrote to memory of 2552 2284 rMX.exe.exe 36 PID 2656 wrote to memory of 2616 2656 cmd.exe 37 PID 2656 wrote to memory of 2616 2656 cmd.exe 37 PID 2656 wrote to memory of 2616 2656 cmd.exe 37 PID 2656 wrote to memory of 2616 2656 cmd.exe 37 PID 2552 wrote to memory of 2492 2552 cmd.exe 39 PID 2552 wrote to memory of 2492 2552 cmd.exe 39 PID 2552 wrote to memory of 2492 2552 cmd.exe 39 PID 2552 wrote to memory of 2492 2552 cmd.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\3db5b5bfb3b1895d0f588f21a56a6cf0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3db5b5bfb3b1895d0f588f21a56a6cf0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\WINDOWS\VWFLH\rMX.exeC:\WINDOWS\VWFLH\rMX.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\cmd.execmd /c echo 0>>c:\windows\nk.txt3⤵
- Drops file in Windows directory
PID:2980
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\WINDOWS\VWFLH\rMX.exe.exe3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\WINDOWS\VWFLH\rMX.exe.exeC:\WINDOWS\VWFLH\rMX.exe.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\cmd.execmd /c c:\99.vbs5⤵
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\99.vbs"6⤵PID:2492
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c c:\76.vbs2⤵
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\76.vbs"3⤵
- Deletes itself
PID:2616
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
219B
MD5e8ced48552561cb2487c3d135877a87e
SHA13341836e2cf9887fda4f80abd7573dda7a73ed5a
SHA256c717544b9483f758f4aa6b7245555e761a9f899bfd455856dff215786ce16e99
SHA5121bed96cbf7397f56c8028141e4c29e1cc8bd6957ddeda6657b834d49a13aa840d03c14dde3535d4bf9fef45e690a3f9691819725c1369ca184c4730a83aca5f8
-
Filesize
162B
MD510a39caa2d7472b60a063fe798cf5c81
SHA1fe3d98fcae0f60981e24ce2d284bb5a674e57883
SHA256f8a1869858d7d61799a57c50db3b9c77abeb2c67c463cc989f223f9e0c068837
SHA51214a4ea22451435c5b866e9ef84ac5a0b91822719886943446fd47562e23d9c01a5295f90676e3304088f16a51ecca0a3275f2a9073ba47bb65916a9e06d7ce63
-
Filesize
95KB
MD53db5b5bfb3b1895d0f588f21a56a6cf0
SHA15daff830c0efe149a73233cdf81fa7be4ddaf835
SHA256c432cfcfbfc7f44056ef3aec4ac951fdbc753439647a0e2b835bab297a83b6f3
SHA512c2147f1dd2a2767561144cf166b83938a5448df24277da30834f099b7886ce06bed7ffc43803f8bedb08727565d10ad43c59b0d297cdd7276a19abef20e62d09
-
Filesize
95KB
MD55a8ba2d7fa2055c0c0567c7aef5f50ed
SHA1cf9461f0b3a48befbc6887f93db8de70ef1862a4
SHA256fb61137569f7ff9c5a7d9c97b0e9c16223d9ed78cd41653b0223efe1eba2f67a
SHA512bfa34cae8ad3819a72aa1639d422df23c9d5afe325d20c88993eb3ecf02b0ba041f23c5a99227bbc05cbc7ecfff56c71ef593993382aa853670b002cb5cde1dc