Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
18-06-2024 09:39
Static task
static1
Behavioral task
behavioral1
Sample
34373a2cd74d55362c44e5bcd569ba00_NeikiAnalytics.exe
Resource
win7-20240611-en
General
-
Target
34373a2cd74d55362c44e5bcd569ba00_NeikiAnalytics.exe
-
Size
290KB
-
MD5
34373a2cd74d55362c44e5bcd569ba00
-
SHA1
b704e9bdb73bae4d9bca9d4c3b074070e525f07a
-
SHA256
3465a6f61f1327ffdf1264cc9616040f308f466c2ea8e4d7fa96a954649f0dfc
-
SHA512
29f7b7a24a9c4dcf315c761d70da5f39488326cc9712195d5772b94f77db376372e350f67e075a7a3abc11beb21ecb64ea10ffb988f3f203ad3b5405b9ae87d8
-
SSDEEP
6144:96xwSR5NtUIJEWyXuew+q1l0d2Js6H5/TZkKr+:9A3NtUISdPw+Elq2Jsm2j
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\siyqb.exe aspack_v212_v242 -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2888 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
ucxiz.exesiyqb.exepid process 1996 ucxiz.exe 352 siyqb.exe -
Loads dropped DLL 3 IoCs
Processes:
34373a2cd74d55362c44e5bcd569ba00_NeikiAnalytics.exeucxiz.exepid process 2468 34373a2cd74d55362c44e5bcd569ba00_NeikiAnalytics.exe 2468 34373a2cd74d55362c44e5bcd569ba00_NeikiAnalytics.exe 1996 ucxiz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 54 IoCs
Processes:
siyqb.exepid process 352 siyqb.exe 352 siyqb.exe 352 siyqb.exe 352 siyqb.exe 352 siyqb.exe 352 siyqb.exe 352 siyqb.exe 352 siyqb.exe 352 siyqb.exe 352 siyqb.exe 352 siyqb.exe 352 siyqb.exe 352 siyqb.exe 352 siyqb.exe 352 siyqb.exe 352 siyqb.exe 352 siyqb.exe 352 siyqb.exe 352 siyqb.exe 352 siyqb.exe 352 siyqb.exe 352 siyqb.exe 352 siyqb.exe 352 siyqb.exe 352 siyqb.exe 352 siyqb.exe 352 siyqb.exe 352 siyqb.exe 352 siyqb.exe 352 siyqb.exe 352 siyqb.exe 352 siyqb.exe 352 siyqb.exe 352 siyqb.exe 352 siyqb.exe 352 siyqb.exe 352 siyqb.exe 352 siyqb.exe 352 siyqb.exe 352 siyqb.exe 352 siyqb.exe 352 siyqb.exe 352 siyqb.exe 352 siyqb.exe 352 siyqb.exe 352 siyqb.exe 352 siyqb.exe 352 siyqb.exe 352 siyqb.exe 352 siyqb.exe 352 siyqb.exe 352 siyqb.exe 352 siyqb.exe 352 siyqb.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
34373a2cd74d55362c44e5bcd569ba00_NeikiAnalytics.exeucxiz.exedescription pid process target process PID 2468 wrote to memory of 1996 2468 34373a2cd74d55362c44e5bcd569ba00_NeikiAnalytics.exe ucxiz.exe PID 2468 wrote to memory of 1996 2468 34373a2cd74d55362c44e5bcd569ba00_NeikiAnalytics.exe ucxiz.exe PID 2468 wrote to memory of 1996 2468 34373a2cd74d55362c44e5bcd569ba00_NeikiAnalytics.exe ucxiz.exe PID 2468 wrote to memory of 1996 2468 34373a2cd74d55362c44e5bcd569ba00_NeikiAnalytics.exe ucxiz.exe PID 2468 wrote to memory of 2888 2468 34373a2cd74d55362c44e5bcd569ba00_NeikiAnalytics.exe cmd.exe PID 2468 wrote to memory of 2888 2468 34373a2cd74d55362c44e5bcd569ba00_NeikiAnalytics.exe cmd.exe PID 2468 wrote to memory of 2888 2468 34373a2cd74d55362c44e5bcd569ba00_NeikiAnalytics.exe cmd.exe PID 2468 wrote to memory of 2888 2468 34373a2cd74d55362c44e5bcd569ba00_NeikiAnalytics.exe cmd.exe PID 1996 wrote to memory of 352 1996 ucxiz.exe siyqb.exe PID 1996 wrote to memory of 352 1996 ucxiz.exe siyqb.exe PID 1996 wrote to memory of 352 1996 ucxiz.exe siyqb.exe PID 1996 wrote to memory of 352 1996 ucxiz.exe siyqb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\34373a2cd74d55362c44e5bcd569ba00_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\34373a2cd74d55362c44e5bcd569ba00_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\ucxiz.exe"C:\Users\Admin\AppData\Local\Temp\ucxiz.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\siyqb.exe"C:\Users\Admin\AppData\Local\Temp\siyqb.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:352
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uinsey.bat" "2⤵
- Deletes itself
PID:2888
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
306B
MD556c51fa9ecef8e5d1c21f02c7d28aa13
SHA188f8148b0e53a827053580a1353abd5f459ec1bd
SHA25699fd1205ca5ad241687209bc04a06c39a9eab0f0fe8d62af36b31291ee6aa069
SHA5125ace88a878921c44c69a8ffdcd54cec9613a2e04facf0e84d753826ec1f11b149d6c89c57991bb5ec130c0c0556cf69959f0ea2f51f89834753d857c407c3a3d
-
Filesize
512B
MD53367dd81a45b2ad884cd1a66963945ce
SHA17ea635e836e02baf2a0d009482c2852a0c4b1cfe
SHA2564568b436511d05696cde0dc18d3a65dd233f84c387899b3ec58a5ad6ea9c31b0
SHA5123f774522d357f1db4efdf7663498903bb9ead4272c6c999f3947216980480269bf63e397fce42d2ac510a2c863884d433b45c705b6e94330cf0a8f3562dfc63a
-
Filesize
216KB
MD5ee5ef65420b717df83c5087f3a5c9b90
SHA12c1dfa3e9bd9db0ec1180d6964da47713ac236e3
SHA25649157ae3208327c519958c30d2c84bab8fad67b854e75bde3c3c2cbff4a33dd1
SHA512b81d3ed544c32cd3b079d3fd40ebea59aee54882d1648c8db8454da4667652acebee123fe2a20c6f7bfa24a1f06355c02dbfd70b2005377bc39370b59cf1fd54
-
Filesize
290KB
MD5f46e9df83bf08be2aca8592e4c013770
SHA13b98a4016317d0dafe85d3c0834a7256c8858327
SHA2569cfbfea0a33a45cc30820fac2f67a179e2dd715ffdd6732c66fb1cf46b6b12f4
SHA512e85be237cdd91fb15d4e65f1d7fa516bd9515bc3a0ad1cb546d7c85b7230e72476d55d973baa2e9ca2a0d8f93f8c6267d5651ba4883c940734921b070849abda