Analysis

  • max time kernel
    149s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    08/06/2024, 16:26

General

  • Target

    f396c75ddd59cf3eb1ce3ec02db1e280_NeikiAnalytics.exe

  • Size

    88KB

  • MD5

    f396c75ddd59cf3eb1ce3ec02db1e280

  • SHA1

    bc78c229713dfbc0bf08e1dd6643ee923ac20185

  • SHA256

    166ca3e36d4c76e1c6d949296b7d76e9324090282a823f7fa14cd6c42779b4ba

  • SHA512

    f02bfa489752674e88b9b0e9dd01d5026f9e774a36c1980223afdcfb95c1038e45d61971c397e781004b466366c655c5b7e45b1daa394895c71bc58615ef908f

  • SSDEEP

    1536:sIisW7IQ/JDHKa5LJW6/Z2NZQKvdmNmS/:ZUI8DHKuFOJvdN

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f396c75ddd59cf3eb1ce3ec02db1e280_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\f396c75ddd59cf3eb1ce3ec02db1e280_NeikiAnalytics.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2148
    • C:\Users\Admin\lauup.exe
      "C:\Users\Admin\lauup.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2412

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\lauup.exe

          Filesize

          88KB

          MD5

          fa52aa6cf25d07bd437deddc97c74d89

          SHA1

          f311d76034a17204071ee8c8dff0a7b8f384a2e3

          SHA256

          9c65d14652b120f9ae73a8b43334c4564e52e730415fc905aadd583b5fe26aac

          SHA512

          6939cb982e42d6aafd95730d90a874a180968ed5eddb69502a8dd6ba7b2f4ecfc28b34b76122fc62dbd6993bda9f9b4e021fb06a74aea8bd675170dae70053ff

        • memory/2148-0-0x0000000000400000-0x000000000041D000-memory.dmp

          Filesize

          116KB

        • memory/2148-9-0x00000000031E0000-0x00000000031FD000-memory.dmp

          Filesize

          116KB

        • memory/2148-15-0x00000000031E0000-0x00000000031FD000-memory.dmp

          Filesize

          116KB

        • memory/2148-19-0x0000000000400000-0x000000000041D000-memory.dmp

          Filesize

          116KB

        • memory/2148-20-0x00000000031E0000-0x00000000031FD000-memory.dmp

          Filesize

          116KB

        • memory/2412-21-0x0000000000400000-0x000000000041D000-memory.dmp

          Filesize

          116KB