Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
18-06-2024 21:11
Behavioral task
behavioral1
Sample
53af414bd3858e38cffb022ad676f6a0_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
53af414bd3858e38cffb022ad676f6a0_NeikiAnalytics.exe
-
Size
112KB
-
MD5
53af414bd3858e38cffb022ad676f6a0
-
SHA1
f234506433f39d1de52c4c615debfd427c01e123
-
SHA256
292aaf26fd2fd5282bc16f145086d45a23335eee91fb31e5846e6297d44cb767
-
SHA512
009b9ad86f3eaf853ccabae90bfc0946b2083b233354a9ebc587740cd3c482f820b3d6aee2d6541feb2d061ebead4e64d9670dc8bc2d33efe90fb9a3f5056135
-
SSDEEP
1536:3JoHHwAnTtIBcNCk+syhonfC3GNKcK7+sWjcd8sWL64TGFju+t:4tCc+/h0fmSid81L64TGVu+t
Malware Config
Extracted
urelas
218.54.47.76
218.54.47.77
218.54.47.74
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2632 cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
biudfw.exepid process 2252 biudfw.exe -
Loads dropped DLL 1 IoCs
Processes:
53af414bd3858e38cffb022ad676f6a0_NeikiAnalytics.exepid process 1736 53af414bd3858e38cffb022ad676f6a0_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
53af414bd3858e38cffb022ad676f6a0_NeikiAnalytics.exedescription pid process target process PID 1736 wrote to memory of 2252 1736 53af414bd3858e38cffb022ad676f6a0_NeikiAnalytics.exe biudfw.exe PID 1736 wrote to memory of 2252 1736 53af414bd3858e38cffb022ad676f6a0_NeikiAnalytics.exe biudfw.exe PID 1736 wrote to memory of 2252 1736 53af414bd3858e38cffb022ad676f6a0_NeikiAnalytics.exe biudfw.exe PID 1736 wrote to memory of 2252 1736 53af414bd3858e38cffb022ad676f6a0_NeikiAnalytics.exe biudfw.exe PID 1736 wrote to memory of 2632 1736 53af414bd3858e38cffb022ad676f6a0_NeikiAnalytics.exe cmd.exe PID 1736 wrote to memory of 2632 1736 53af414bd3858e38cffb022ad676f6a0_NeikiAnalytics.exe cmd.exe PID 1736 wrote to memory of 2632 1736 53af414bd3858e38cffb022ad676f6a0_NeikiAnalytics.exe cmd.exe PID 1736 wrote to memory of 2632 1736 53af414bd3858e38cffb022ad676f6a0_NeikiAnalytics.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\53af414bd3858e38cffb022ad676f6a0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\53af414bd3858e38cffb022ad676f6a0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\biudfw.exe"C:\Users\Admin\AppData\Local\Temp\biudfw.exe"2⤵
- Executes dropped EXE
PID:2252
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- Deletes itself
PID:2632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD5429d29b7501cff75ffd4e7af0b24db41
SHA153808fde744d4d65aa2f4c48e8644a65f81be038
SHA2568076fa1dc4b0ecf16960cc5c92abd9dc5c4542fb7ff92073e8b6a24ba1eea1c7
SHA51283516d410586a6224af7cfc232b65d36a0e74e8c75264c737c20a9956aec011f1bd6343ad5b573219804cc8f76697a98b287d7117669e9375947fcfe49bd4e07
-
Filesize
304B
MD5c98f7c99bd74a89d08fc47a196bfbc7e
SHA12579e913318f36c950d0058bf6235a5cbefe01a8
SHA256634e1301556c0c2e379663cad4856d7ef9d532f1dadbc3f78a2f6da6c90bd67f
SHA5120d907308db2c098a34a6511bb723461e01e4dbbab9a8498e91c38d4c12a5f3a46a956666e25f5c8aafc954e850761abd7ad2c5f208c8eb6ea0ae78f03ccacdcb
-
Filesize
112KB
MD5bd469b3b02abb5c11d43178d682d1d64
SHA1d48ea009b5f005c75e42e2578ee0140f84a1a3f2
SHA25601541981b4832cf4d2b3a09bb62a160b4284b1992678bc724e49ed955d1d8875
SHA512d21b38ad0b7b99978ec3597eab320b8fc8fd5792e5a8e0f7ceb225d42d47fac6a57647d47ca64a7e57897bac933dee66451c3898ea589ddbe4b7ab75c2acde10