Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
11-06-2024 23:09
Behavioral task
behavioral1
Sample
0ba7cdd478b3f411d9fdd36169a1a5a0_NeikiAnalytics.exe
Resource
win7-20231129-en
General
-
Target
0ba7cdd478b3f411d9fdd36169a1a5a0_NeikiAnalytics.exe
-
Size
323KB
-
MD5
0ba7cdd478b3f411d9fdd36169a1a5a0
-
SHA1
381e4fa18d8e2c4741afc0d961463a690cca9606
-
SHA256
4a962624adb34f6e3f897a5397f351abe1bb08da2cd7f96ff10c7cde8d4068e6
-
SHA512
2650399e35ed009370047720ffacd2fbd3f1f8e4c86b89e22e8a757c879a2eb624445e296f44e341317bf2d88ff2314a8ab3f0b5db28c2188f00d42a5e3150f8
-
SSDEEP
6144:cEo/rmV71+I8ZD/h/vFfhxxQO4B4tqv+Hq/On1NHwBzQ4bed76a3FoSx0f:cEo/6YnZVB1rkAqcNAzQCed7J1oS8
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.226
218.54.31.165
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2412 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
zibux.exepofov.exepid process 3000 zibux.exe 2812 pofov.exe -
Loads dropped DLL 2 IoCs
Processes:
0ba7cdd478b3f411d9fdd36169a1a5a0_NeikiAnalytics.exezibux.exepid process 2136 0ba7cdd478b3f411d9fdd36169a1a5a0_NeikiAnalytics.exe 3000 zibux.exe -
Processes:
resource yara_rule behavioral1/memory/2136-0-0x0000000000400000-0x0000000000489000-memory.dmp upx \Users\Admin\AppData\Local\Temp\zibux.exe upx behavioral1/memory/2136-8-0x0000000002BC0000-0x0000000002C49000-memory.dmp upx behavioral1/memory/3000-17-0x0000000000400000-0x0000000000489000-memory.dmp upx behavioral1/memory/2136-19-0x0000000000400000-0x0000000000489000-memory.dmp upx behavioral1/memory/3000-22-0x0000000000400000-0x0000000000489000-memory.dmp upx behavioral1/memory/3000-37-0x0000000003130000-0x00000000031E6000-memory.dmp upx behavioral1/memory/3000-39-0x0000000000400000-0x0000000000489000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 54 IoCs
Processes:
pofov.exepid process 2812 pofov.exe 2812 pofov.exe 2812 pofov.exe 2812 pofov.exe 2812 pofov.exe 2812 pofov.exe 2812 pofov.exe 2812 pofov.exe 2812 pofov.exe 2812 pofov.exe 2812 pofov.exe 2812 pofov.exe 2812 pofov.exe 2812 pofov.exe 2812 pofov.exe 2812 pofov.exe 2812 pofov.exe 2812 pofov.exe 2812 pofov.exe 2812 pofov.exe 2812 pofov.exe 2812 pofov.exe 2812 pofov.exe 2812 pofov.exe 2812 pofov.exe 2812 pofov.exe 2812 pofov.exe 2812 pofov.exe 2812 pofov.exe 2812 pofov.exe 2812 pofov.exe 2812 pofov.exe 2812 pofov.exe 2812 pofov.exe 2812 pofov.exe 2812 pofov.exe 2812 pofov.exe 2812 pofov.exe 2812 pofov.exe 2812 pofov.exe 2812 pofov.exe 2812 pofov.exe 2812 pofov.exe 2812 pofov.exe 2812 pofov.exe 2812 pofov.exe 2812 pofov.exe 2812 pofov.exe 2812 pofov.exe 2812 pofov.exe 2812 pofov.exe 2812 pofov.exe 2812 pofov.exe 2812 pofov.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
0ba7cdd478b3f411d9fdd36169a1a5a0_NeikiAnalytics.exezibux.exedescription pid process target process PID 2136 wrote to memory of 3000 2136 0ba7cdd478b3f411d9fdd36169a1a5a0_NeikiAnalytics.exe zibux.exe PID 2136 wrote to memory of 3000 2136 0ba7cdd478b3f411d9fdd36169a1a5a0_NeikiAnalytics.exe zibux.exe PID 2136 wrote to memory of 3000 2136 0ba7cdd478b3f411d9fdd36169a1a5a0_NeikiAnalytics.exe zibux.exe PID 2136 wrote to memory of 3000 2136 0ba7cdd478b3f411d9fdd36169a1a5a0_NeikiAnalytics.exe zibux.exe PID 2136 wrote to memory of 2412 2136 0ba7cdd478b3f411d9fdd36169a1a5a0_NeikiAnalytics.exe cmd.exe PID 2136 wrote to memory of 2412 2136 0ba7cdd478b3f411d9fdd36169a1a5a0_NeikiAnalytics.exe cmd.exe PID 2136 wrote to memory of 2412 2136 0ba7cdd478b3f411d9fdd36169a1a5a0_NeikiAnalytics.exe cmd.exe PID 2136 wrote to memory of 2412 2136 0ba7cdd478b3f411d9fdd36169a1a5a0_NeikiAnalytics.exe cmd.exe PID 3000 wrote to memory of 2812 3000 zibux.exe pofov.exe PID 3000 wrote to memory of 2812 3000 zibux.exe pofov.exe PID 3000 wrote to memory of 2812 3000 zibux.exe pofov.exe PID 3000 wrote to memory of 2812 3000 zibux.exe pofov.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ba7cdd478b3f411d9fdd36169a1a5a0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\0ba7cdd478b3f411d9fdd36169a1a5a0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\zibux.exe"C:\Users\Admin\AppData\Local\Temp\zibux.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\pofov.exe"C:\Users\Admin\AppData\Local\Temp\pofov.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2812
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
PID:2412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
306B
MD56778423902e30899d74d9bb16997eb87
SHA1addea5cb9ba9bb8eef34eb12f0c80a297d7a01e9
SHA2561708d0d9935346d8c17ae7978608b3eb5593a5e34876aca808b69c18cbe4ff2f
SHA5121bcbdf6a88df029c2cc28ecafbb8a31c7144c115b0219eeb599679c0c499fecd441b06ec52bc5d3fe96194ae90ed2ac700a5243ec615415f281ef0f1a4e23974
-
Filesize
512B
MD586d72b0e523b35ede07e8c0b32658f44
SHA147ea41d6e07d8f996c4a42760675f38360616ffe
SHA256a906fff9d263a9534291f59c20136107b5af93ff9ba627ec1dfab621f0f12d6d
SHA512312eb07d9bc41985e1e7a03e79c07871b53aa7da23832959eb2c145fb62104f3d7d98df7392555b92c4eca4a4d67e7e78fb6ebf98b3946e6a3b463f951fc3030
-
Filesize
241KB
MD5c1ab72057450338707b60e246a8a816d
SHA1f4e057585110e0a431af9484787a2125aa03acd5
SHA2560744998e4e2c94936f98ee71b12f157084bdf63c3b7814ffad6e5b9cf21f75f1
SHA5127f3e81801386703abe44128c8f4a05006a53177b64ab05ee111dce5f65f9a2065d2871dec995e6801e71b496c66b14ce01a6478b60d663d9c99dec24524eafa9
-
Filesize
323KB
MD50ca28999156b471064027001204d4e5b
SHA16a928c80da3ada16b72d772bb21ea57c4e93aebc
SHA256596bda1c2ee3dc5b6ffdc132dbd55633db1a2f4b611b97a39bf7b3e88a00b98a
SHA5124b70ba45b7f21d12143b61ff5a48afbdfa61c5f2f8c4bcac9a9ed54388c6c1f0dd37aefd5967081f662bf44da553d2f8a1bc3d9df013ade24cfca2cc0001b9f2