Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18-06-2024 23:04
Behavioral task
behavioral1
Sample
624efc1dbe90125eddada90974fdace0_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
624efc1dbe90125eddada90974fdace0_NeikiAnalytics.exe
-
Size
368KB
-
MD5
624efc1dbe90125eddada90974fdace0
-
SHA1
f7f33cdd1c1d1da5de95dec6affc70be0dfeb711
-
SHA256
060925840131f267857344edc2c2c4ca8aa8e4d20b029f8e35baec4c92f8debc
-
SHA512
bbae1bdb52932a1fd008cd03520f891da91cd4845d8fb00acaa112d0426474e33fa2a24d6915d08a4f78724382f9ad94affeb7cbb53debd4688ccbd7aed1c174
-
SSDEEP
6144:OuJkl8DV12C28tLN2/FkCOfHVm0fMaHftvCGCBhDOHjTPmXHk62psW:OzGL2C2aZ2/F1WHHUaveOHjTH
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.165
218.54.31.226
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2564 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
jaesh.exevuhai.exepid process 2948 jaesh.exe 1216 vuhai.exe -
Loads dropped DLL 3 IoCs
Processes:
624efc1dbe90125eddada90974fdace0_NeikiAnalytics.exejaesh.exepid process 2008 624efc1dbe90125eddada90974fdace0_NeikiAnalytics.exe 2948 jaesh.exe 2948 jaesh.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 54 IoCs
Processes:
vuhai.exepid process 1216 vuhai.exe 1216 vuhai.exe 1216 vuhai.exe 1216 vuhai.exe 1216 vuhai.exe 1216 vuhai.exe 1216 vuhai.exe 1216 vuhai.exe 1216 vuhai.exe 1216 vuhai.exe 1216 vuhai.exe 1216 vuhai.exe 1216 vuhai.exe 1216 vuhai.exe 1216 vuhai.exe 1216 vuhai.exe 1216 vuhai.exe 1216 vuhai.exe 1216 vuhai.exe 1216 vuhai.exe 1216 vuhai.exe 1216 vuhai.exe 1216 vuhai.exe 1216 vuhai.exe 1216 vuhai.exe 1216 vuhai.exe 1216 vuhai.exe 1216 vuhai.exe 1216 vuhai.exe 1216 vuhai.exe 1216 vuhai.exe 1216 vuhai.exe 1216 vuhai.exe 1216 vuhai.exe 1216 vuhai.exe 1216 vuhai.exe 1216 vuhai.exe 1216 vuhai.exe 1216 vuhai.exe 1216 vuhai.exe 1216 vuhai.exe 1216 vuhai.exe 1216 vuhai.exe 1216 vuhai.exe 1216 vuhai.exe 1216 vuhai.exe 1216 vuhai.exe 1216 vuhai.exe 1216 vuhai.exe 1216 vuhai.exe 1216 vuhai.exe 1216 vuhai.exe 1216 vuhai.exe 1216 vuhai.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
624efc1dbe90125eddada90974fdace0_NeikiAnalytics.exejaesh.exedescription pid process target process PID 2008 wrote to memory of 2948 2008 624efc1dbe90125eddada90974fdace0_NeikiAnalytics.exe jaesh.exe PID 2008 wrote to memory of 2948 2008 624efc1dbe90125eddada90974fdace0_NeikiAnalytics.exe jaesh.exe PID 2008 wrote to memory of 2948 2008 624efc1dbe90125eddada90974fdace0_NeikiAnalytics.exe jaesh.exe PID 2008 wrote to memory of 2948 2008 624efc1dbe90125eddada90974fdace0_NeikiAnalytics.exe jaesh.exe PID 2008 wrote to memory of 2564 2008 624efc1dbe90125eddada90974fdace0_NeikiAnalytics.exe cmd.exe PID 2008 wrote to memory of 2564 2008 624efc1dbe90125eddada90974fdace0_NeikiAnalytics.exe cmd.exe PID 2008 wrote to memory of 2564 2008 624efc1dbe90125eddada90974fdace0_NeikiAnalytics.exe cmd.exe PID 2008 wrote to memory of 2564 2008 624efc1dbe90125eddada90974fdace0_NeikiAnalytics.exe cmd.exe PID 2948 wrote to memory of 1216 2948 jaesh.exe vuhai.exe PID 2948 wrote to memory of 1216 2948 jaesh.exe vuhai.exe PID 2948 wrote to memory of 1216 2948 jaesh.exe vuhai.exe PID 2948 wrote to memory of 1216 2948 jaesh.exe vuhai.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\624efc1dbe90125eddada90974fdace0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\624efc1dbe90125eddada90974fdace0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\jaesh.exe"C:\Users\Admin\AppData\Local\Temp\jaesh.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\vuhai.exe"C:\Users\Admin\AppData\Local\Temp\vuhai.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1216
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
PID:2564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
306B
MD578add4663005c31146bb2733aeb55be6
SHA12c221c8fc625dab5f62e0c9d091006d8e0038364
SHA25624d8cec81bb75923aaebc8c866f88cda3cad285adc883682e09f6076714b2c1c
SHA512d4a7bd6087a4ea90c568ee425ea9958e5aeb0c5b0097d2a76217bb1a7ab2a8aac0e475544807212bd83b59539900e24004c20523c47dc58f44c3f5922354935f
-
Filesize
512B
MD52ce6fb2c366d3642dce262b5893e3fd7
SHA19600ef81a49d1875051a143ff58fdddc2e85faf2
SHA256a6e432d8949546eab0a8558e563c30f16fbfaf27f131db535a802c8964958547
SHA51295b70e9bda2067779a0adb6122dff5637cd4852d5b303fcd2dd51c618e2d369063bada5e8bfcf06d6a665892f615e1d6e3994c964f7225b38697756e1d67451c
-
Filesize
368KB
MD51baf7a92fb78a3ce44719f163d3d2726
SHA1ee602bdc286ab601662a1ef4bd3574cb9caee655
SHA25689c8ba3779f0aa96b2189dfc48a9ad6215c43a8fdb7b5d959cd56a880e0d6611
SHA5122f5ae3371a923ce4163cebf06eec8ca9c9f385801a13226efbddd3e75266e8cab79d670c313a456adf279e3c1c571088edc2966ffa162d9e499300ea49319a91
-
Filesize
303KB
MD5e9267e44a64f6273c64ad5a545f05073
SHA18ff4b536a674e798152e63300f6ab1779308046e
SHA25647f57ef4066370f2fc9909ee6b6c8c774546eaade6df64c04cec89bd9f9a614e
SHA5123d91b47f080c5c09b508eba27cd2474d7b21c861404ee527e0c14b0b7e28984c4dbcff74fb1c911603c00ee610547a30cf768a6f4123408c251b13a355ae1824