Malware Analysis Report

2024-09-11 07:35

Sample ID 240613-zcn9nazbng
Target 84bfb3c77fa8bd3ee5584971807298f0_NeikiAnalytics.exe
SHA256 00eb5a80e3c5bfec07ee4c60f6f88fd809e543843324773590f1864ef1159fa0
Tags
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

00eb5a80e3c5bfec07ee4c60f6f88fd809e543843324773590f1864ef1159fa0

Threat Level: Shows suspicious behavior

The file 84bfb3c77fa8bd3ee5584971807298f0_NeikiAnalytics.exe was found to be: Shows suspicious behavior.

Malicious Activity Summary


Checks computer location settings

Executes dropped EXE

Loads dropped DLL

Unsigned PE

Enumerates physical storage devices

Suspicious use of UnmapMainImage

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-13 20:34

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-13 20:34

Reported

2024-06-13 20:37

Platform

win7-20240508-en

Max time kernel

147s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\84bfb3c77fa8bd3ee5584971807298f0_NeikiAnalytics.exe"

Signatures

Processes

C:\Users\Admin\AppData\Local\Temp\84bfb3c77fa8bd3ee5584971807298f0_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\84bfb3c77fa8bd3ee5584971807298f0_NeikiAnalytics.exe"

C:\Users\Admin\AppData\Local\Temp\ffengh.exe

"C:\Users\Admin\AppData\Local\Temp\ffengh.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 drippingstrawberry.com udp
US 8.8.8.8:53 drippingstrawberry.com udp
US 8.8.8.8:53 drippingstrawberry.com udp
US 8.8.8.8:53 drippingstrawberry.com udp
US 8.8.8.8:53 drippingstrawberry.com udp
US 8.8.8.8:53 drippingstrawberry.com udp
US 8.8.8.8:53 drippingstrawberry.com udp
US 8.8.8.8:53 drippingstrawberry.com udp
US 8.8.8.8:53 drippingstrawberry.com udp
US 8.8.8.8:53 drippingstrawberry.com udp
US 8.8.8.8:53 drippingstrawberry.com udp
US 8.8.8.8:53 drippingstrawberry.com udp
US 8.8.8.8:53 drippingstrawberry.com udp

Files

memory/2552-0-0x0000000000230000-0x0000000000237000-memory.dmp

memory/2552-1-0x0000000000400000-0x0000000000404000-memory.dmp

memory/2552-6-0x0000000000230000-0x0000000000237000-memory.dmp

\Users\Admin\AppData\Local\Temp\ffengh.exe

MD5 4d5a0739e2de56bad28e5ca05dda3a59
SHA1 4cb689444b931c05278a74b31a9b117cebf0215e
SHA256 f7551ff13aab8299183560b0d0204a3b68e60acacf5ba2466b0dea5a0a7633dc
SHA512 fe3113d740f625bdf31ad1e3a5836e934a70c0382648087554ab36cc9d0a3a987f924a8bdd6b658b299b98fb98a1c6ecad64f713028e3c02a4f0aaf6788c7a89

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-13 20:34

Reported

2024-06-13 20:37

Platform

win10v2004-20240611-en

Max time kernel

91s

Max time network

95s

Command Line

"C:\Users\Admin\AppData\Local\Temp\84bfb3c77fa8bd3ee5584971807298f0_NeikiAnalytics.exe"

Signatures

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\84bfb3c77fa8bd3ee5584971807298f0_NeikiAnalytics.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\ffengh.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\ffengh.exe N/A

Enumerates physical storage devices

Processes

C:\Users\Admin\AppData\Local\Temp\84bfb3c77fa8bd3ee5584971807298f0_NeikiAnalytics.exe

"C:\Users\Admin\AppData\Local\Temp\84bfb3c77fa8bd3ee5584971807298f0_NeikiAnalytics.exe"

C:\Users\Admin\AppData\Local\Temp\ffengh.exe

"C:\Users\Admin\AppData\Local\Temp\ffengh.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 drippingstrawberry.com udp
US 44.221.84.105:443 drippingstrawberry.com tcp
US 8.8.8.8:53 105.84.221.44.in-addr.arpa udp
US 8.8.8.8:53 40.93.73.104.in-addr.arpa udp
US 8.8.8.8:53 26.97.21.2.in-addr.arpa udp
US 8.8.8.8:53 23.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 88.251.17.2.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 57.15.31.184.in-addr.arpa udp
US 8.8.8.8:53 98.251.17.2.in-addr.arpa udp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp

Files

memory/4432-0-0x0000000000590000-0x0000000000597000-memory.dmp

memory/4432-1-0x0000000000400000-0x0000000000404000-memory.dmp

memory/4432-6-0x0000000000590000-0x0000000000597000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\ffengh.exe

MD5 4d5a0739e2de56bad28e5ca05dda3a59
SHA1 4cb689444b931c05278a74b31a9b117cebf0215e
SHA256 f7551ff13aab8299183560b0d0204a3b68e60acacf5ba2466b0dea5a0a7633dc
SHA512 fe3113d740f625bdf31ad1e3a5836e934a70c0382648087554ab36cc9d0a3a987f924a8bdd6b658b299b98fb98a1c6ecad64f713028e3c02a4f0aaf6788c7a89

memory/4272-21-0x00000000005A0000-0x00000000005A7000-memory.dmp