Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
18-06-2024 23:22
Behavioral task
behavioral1
Sample
6497276021f583f26c60188ca0e18930_NeikiAnalytics.exe
Resource
win7-20240611-en
General
-
Target
6497276021f583f26c60188ca0e18930_NeikiAnalytics.exe
-
Size
365KB
-
MD5
6497276021f583f26c60188ca0e18930
-
SHA1
e8b38782979babaeb5dad7c8894e0b35fae25941
-
SHA256
efbfdb4e4673402686c4cefa55e1f34eee026615b70b06b9bad40f07cbcd0fad
-
SHA512
af61d6a94ad332acf139a1a5da5917c5fc0c92308c3c8b2215c65743e705a1105e56e3548e23740224f4b0cc66f5e4065b09674e2b06fe1b786335475ca8002d
-
SSDEEP
6144:OuJkl8DV12C28tLN2/FkCOfHVm0fMaHftvCGCBhDOHjTPmXHk62p+:OzGL2C2aZ2/F1WHHUaveOHjTC
Malware Config
Extracted
urelas
1.234.83.146
133.242.129.155
218.54.31.165
218.54.31.226
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2308 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
qocam.exeejroh.exepid process 2064 qocam.exe 2368 ejroh.exe -
Loads dropped DLL 3 IoCs
Processes:
6497276021f583f26c60188ca0e18930_NeikiAnalytics.exeqocam.exepid process 2072 6497276021f583f26c60188ca0e18930_NeikiAnalytics.exe 2064 qocam.exe 2064 qocam.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 54 IoCs
Processes:
ejroh.exepid process 2368 ejroh.exe 2368 ejroh.exe 2368 ejroh.exe 2368 ejroh.exe 2368 ejroh.exe 2368 ejroh.exe 2368 ejroh.exe 2368 ejroh.exe 2368 ejroh.exe 2368 ejroh.exe 2368 ejroh.exe 2368 ejroh.exe 2368 ejroh.exe 2368 ejroh.exe 2368 ejroh.exe 2368 ejroh.exe 2368 ejroh.exe 2368 ejroh.exe 2368 ejroh.exe 2368 ejroh.exe 2368 ejroh.exe 2368 ejroh.exe 2368 ejroh.exe 2368 ejroh.exe 2368 ejroh.exe 2368 ejroh.exe 2368 ejroh.exe 2368 ejroh.exe 2368 ejroh.exe 2368 ejroh.exe 2368 ejroh.exe 2368 ejroh.exe 2368 ejroh.exe 2368 ejroh.exe 2368 ejroh.exe 2368 ejroh.exe 2368 ejroh.exe 2368 ejroh.exe 2368 ejroh.exe 2368 ejroh.exe 2368 ejroh.exe 2368 ejroh.exe 2368 ejroh.exe 2368 ejroh.exe 2368 ejroh.exe 2368 ejroh.exe 2368 ejroh.exe 2368 ejroh.exe 2368 ejroh.exe 2368 ejroh.exe 2368 ejroh.exe 2368 ejroh.exe 2368 ejroh.exe 2368 ejroh.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
6497276021f583f26c60188ca0e18930_NeikiAnalytics.exeqocam.exedescription pid process target process PID 2072 wrote to memory of 2064 2072 6497276021f583f26c60188ca0e18930_NeikiAnalytics.exe qocam.exe PID 2072 wrote to memory of 2064 2072 6497276021f583f26c60188ca0e18930_NeikiAnalytics.exe qocam.exe PID 2072 wrote to memory of 2064 2072 6497276021f583f26c60188ca0e18930_NeikiAnalytics.exe qocam.exe PID 2072 wrote to memory of 2064 2072 6497276021f583f26c60188ca0e18930_NeikiAnalytics.exe qocam.exe PID 2072 wrote to memory of 2308 2072 6497276021f583f26c60188ca0e18930_NeikiAnalytics.exe cmd.exe PID 2072 wrote to memory of 2308 2072 6497276021f583f26c60188ca0e18930_NeikiAnalytics.exe cmd.exe PID 2072 wrote to memory of 2308 2072 6497276021f583f26c60188ca0e18930_NeikiAnalytics.exe cmd.exe PID 2072 wrote to memory of 2308 2072 6497276021f583f26c60188ca0e18930_NeikiAnalytics.exe cmd.exe PID 2064 wrote to memory of 2368 2064 qocam.exe ejroh.exe PID 2064 wrote to memory of 2368 2064 qocam.exe ejroh.exe PID 2064 wrote to memory of 2368 2064 qocam.exe ejroh.exe PID 2064 wrote to memory of 2368 2064 qocam.exe ejroh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6497276021f583f26c60188ca0e18930_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\6497276021f583f26c60188ca0e18930_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\qocam.exe"C:\Users\Admin\AppData\Local\Temp\qocam.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\ejroh.exe"C:\Users\Admin\AppData\Local\Temp\ejroh.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2368
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
PID:2308
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
306B
MD566de5e3c497ffc05f778d6f9cdb5046d
SHA17dc1b2ba3d7f04d3366b93d3a9ca3220a1120a67
SHA256eb48fae57a89542c7c4db9a51c9c850181f44cac621ec4a8fa64808f50db03a9
SHA5127ae2e80879a9b3e452b4d256dba366ddc15a2e2a9a0bca2ba3cede55454af084eac8399d879e9604c398d3310871b09e7a954f01a53a6a35e0b8deb49838e575
-
Filesize
303KB
MD5817204eeccfc4dae25c5829384c0b1a3
SHA15a5a86652cc14b2f25f64a8f30623dfff2b65f50
SHA256ecb6070a759945435214a726b0a6520acfafcf77ba410dfe098bbe8a35506b82
SHA512e208b20bde16cd47fb6d570e2e5831406c8a347690eee07a35c94558afbf16e47eddc94c9a911401d57aa33938f2875d0c874c69f8362c31c86b08eed2a60df8
-
Filesize
512B
MD5fe531d9379f11098fcd9856a2cae54bb
SHA1917c7e5f3c4ebfd33e262c934f26854578905d01
SHA2567b234256c84aa11d0d9499f7a6c481b25d4d85863e48957498b22526800a7113
SHA512f3490cf649b474daee0fbb08a9d8b303c8305c23c77ed4076023d3f744610bf2335ce00aacfb2483e72ba012c636070fa6f5365988c0285d82996a709a3c94d3
-
Filesize
365KB
MD5a093c82617af4217f46b4009a07bcf06
SHA1a5ab985097363518f08a57c8e51bcf3bad3711e4
SHA25637685891b02fbba3be1e860750388e090ccdf38ed183b72cfcc620bb23977d20
SHA512c1a9f7b0bfb2de23f5665f4da5c86c1c867976c7ece3f6fcedbc1b7d0b9e611bd98ac83fca503fc9d6e05704a24e82cdf49d0e2902da9532b0d8f5c3b94150bc