Analysis

  • max time kernel
    148s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    16-06-2024 08:12

General

  • Target

    e34ed89299b21df8903a367f30058450_NeikiAnalytics.exe

  • Size

    13KB

  • MD5

    e34ed89299b21df8903a367f30058450

  • SHA1

    f94c7c3f0f05289a93e247047c64511254227b27

  • SHA256

    ab6098c3001f397b2cc5f934985d2e4f4e41ae1e553b4b219d6c56cc25a86f46

  • SHA512

    2857b3d21bebf4d824a2c8ef6a83dfeb42919e6d2a3c171f2010500b5b0ed534d4b479e682bdc13850984a4431b4083deee03788aa4168e270a68b2eae114aa3

  • SSDEEP

    192:pjUWFh4fvYGIQnsA6psQ56uFaNJhLkwcud2DH9VwGfctQEAC5Es9Gsj5Efx8X5d5:5KE7pD/aNJawcudoD7U55Es9GsGyB

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e34ed89299b21df8903a367f30058450_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\e34ed89299b21df8903a367f30058450_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1044
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\JMYCH.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3068
      • C:\Windows\SysWOW64\reg.exe
        REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Ineter Mc" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\trys.exe" /f
        3⤵
        • Adds Run key to start application
        PID:2552
    • C:\Users\Admin\AppData\Roaming\trys.exe
      "C:\Users\Admin\AppData\Roaming\trys.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2604

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\JMYCH.bat

    Filesize

    135B

    MD5

    6dbb2090ff90500da05a027765cde190

    SHA1

    425b833d9d1df8d6df6e5a59f738058808271949

    SHA256

    71ca0761f7187f2164f62b23d5d9d2dcfd28d9ab9a8dfc14796c3ac06db03881

    SHA512

    7e4679e04bd5a69c026949a0d2760a630bc02249a04f3bd224dee41d1bf10f0a29e45812a67c583327a63e5401f0ff2aa9a3f4df8233b150943052c97e861ab3

  • \Users\Admin\AppData\Roaming\trys.exe

    Filesize

    13KB

    MD5

    ad35ff3026fdba7cfc9353c700701ea9

    SHA1

    2081d7d9ab46b35c5c0aa512e3f5de42bac6ccfe

    SHA256

    adbaf72b8e4972b0ee1916532a75398edaa4b0df6f8616e9615a3027d88854e5

    SHA512

    4283a2665bfb8092c8ebc5f678f76fbfa0fa6e74ae6d3b0f5896e2f4c79f980935042691a6cd636ca4cc4c229293b9fc04b66963aaaff8d8ccded3654086805f

  • memory/1044-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1044-26-0x0000000000860000-0x000000000086B000-memory.dmp

    Filesize

    44KB

  • memory/1044-43-0x0000000002540000-0x000000000254B000-memory.dmp

    Filesize

    44KB

  • memory/1044-42-0x0000000002540000-0x000000000254B000-memory.dmp

    Filesize

    44KB

  • memory/1044-41-0x0000000002540000-0x000000000254B000-memory.dmp

    Filesize

    44KB

  • memory/1044-40-0x0000000000860000-0x000000000086B000-memory.dmp

    Filesize

    44KB

  • memory/1044-47-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1044-50-0x0000000002540000-0x000000000254B000-memory.dmp

    Filesize

    44KB

  • memory/1044-52-0x0000000002540000-0x000000000254B000-memory.dmp

    Filesize

    44KB

  • memory/2604-48-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB