Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    20/06/2024, 07:49

General

  • Target

    46ed292893e8302219600f1b5c8f83d6a6fe9d78f7245d7281eb13e994bb122f_NeikiAnalytics.exe

  • Size

    1.5MB

  • MD5

    6c5edd49b86932f574100bf07ccaee20

  • SHA1

    d0f95c2f34e0eb722c5dd21dc7378f91e4f360a9

  • SHA256

    46ed292893e8302219600f1b5c8f83d6a6fe9d78f7245d7281eb13e994bb122f

  • SHA512

    31f9d1bc36da1a6c6be563667ad1f7020f9ac04433d53128beca1db0758f73a483d35b86ecc600e225e707fcdf46a5586c67361f8378ed55630bbc01900aa2a7

  • SSDEEP

    49152:+WUMv5De9/yG9/ooooERQr0tb6H8RlOuQhRe4hvR:+WUMqyGB0Z6H8Rl4y0

Score
6/10

Malware Config

Signatures

  • Checks for any installed AV software in registry 1 TTPs 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Checks processor information in registry 2 TTPs 7 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 19 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\46ed292893e8302219600f1b5c8f83d6a6fe9d78f7245d7281eb13e994bb122f_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\46ed292893e8302219600f1b5c8f83d6a6fe9d78f7245d7281eb13e994bb122f_NeikiAnalytics.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Loads dropped DLL
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2748
    • C:\Windows\Temp\asw-ceca46e0-7772-451d-b86f-0e1e52a09f77\common\icarus.exe
      C:\Windows\Temp\asw-ceca46e0-7772-451d-b86f-0e1e52a09f77\common\icarus.exe /icarus-info-path:C:\Windows\Temp\asw-ceca46e0-7772-451d-b86f-0e1e52a09f77\icarus-info.xml /install /sssid:2748
      2⤵
      • Writes to the Master Boot Record (MBR)
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks processor information in registry
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2500
      • C:\Windows\Temp\asw-ceca46e0-7772-451d-b86f-0e1e52a09f77\common\icarus_ui.exe
        C:\Windows\Temp\asw-ceca46e0-7772-451d-b86f-0e1e52a09f77\common\icarus_ui.exe /sssid:2748 /er_master:master_ep_605eb7ab-981b-4f33-abfc-843978e94e0b /er_ui:ui_ep_df28dd87-f5c6-4c4e-825f-24e9614db2ba
        3⤵
        • Executes dropped EXE
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        PID:1820
      • C:\Windows\Temp\asw-ceca46e0-7772-451d-b86f-0e1e52a09f77\avg-tu\icarus.exe
        C:\Windows\Temp\asw-ceca46e0-7772-451d-b86f-0e1e52a09f77\avg-tu\icarus.exe /sssid:2748 /er_master:master_ep_605eb7ab-981b-4f33-abfc-843978e94e0b /er_ui:ui_ep_df28dd87-f5c6-4c4e-825f-24e9614db2ba /er_slave:avg-tu_slave_ep_96c1c185-796f-4386-af6f-c96026dc43ce /slave:avg-tu
        3⤵
        • Checks for any installed AV software in registry
        • Writes to the Master Boot Record (MBR)
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks processor information in registry
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:1656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\AVG\Icarus\Logs\icarus.log

    Filesize

    48KB

    MD5

    b2d6c70f9160fa31bcbccfd460f45aa5

    SHA1

    01dcc107da93fa3ab7fef35a4063d37a4ba9c6ea

    SHA256

    c09def84053ebe183822ce06434c6435e88dc8698fe910dbbad0a6a7e459bbee

    SHA512

    0d667861179bbe62dec91f944484b70e5c0ebbaf9be52800fb36efdf616020c2d75eee47a1026e2e028a0af852c3819e2b4ac924d590061cdf2e34a4a9d5755b

  • C:\ProgramData\AVG\Icarus\Logs\sfx.log

    Filesize

    11KB

    MD5

    bbeba9fe02066f5ca3bcbdc3bef29e80

    SHA1

    1fa413bfe6f665c79fa8be910580f6fdd5094d30

    SHA256

    832de1c416a77e1974842e5ac07b3f1999c275f680dd699e40757c156d402f49

    SHA512

    a0b7d35f27b56f7a8da8734fe2bc38d3362e92f14c3fc94dcf65518a37e1c5156be4a086c107eab6d1826a24c68de6350a4d8afe40034e7da4b8d00d5a371bc1

  • C:\ProgramData\AVG\Icarus\Logs\sui.log

    Filesize

    10KB

    MD5

    5d5ea4926230170ce9a4c41898ebacef

    SHA1

    cefe769be5dce699f2e7aac1cc5faf48950f262a

    SHA256

    ff0405e43fdcd763ee280ef328db0d9de661dfa2a8991f0cc193218562c20879

    SHA512

    3f4adb183fdc01632c8e11ff4c5814cdb61ad7b84c6f04567e04d3fc39caec5ecf90a1e89ef0ee6baab1aaef949e40e43671d9ba65860e3232cb88c383f4c0f0

  • C:\ProgramData\AVG\Icarus\settings\proxy.ini

    Filesize

    278B

    MD5

    b8853a8e6228549b5d3ad97752d173d4

    SHA1

    cd471a5d57e0946c19a694a6be8a3959cef30341

    SHA256

    8e511706c04e382e58153c274138e99a298e87e29e12548d39b7f3d3442878b9

    SHA512

    cf4edd9ee238c1e621501f91a4c3338ec0cb07ca2c2df00aa7c44d3db7c4f3798bc4137c11c15379d0c71fab1c5c61f19be32ba3fc39dc242313d0947461a787

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\D566D7D7-DCD6-471C-8109-BE0AD33199E3

    Filesize

    64B

    MD5

    22417b5d5eb168147f2c237d658a7163

    SHA1

    6ae67daf07c0a187f397923ecba497e5ab01ed58

    SHA256

    f1945b77f21bf5b8174bc94d0d69d4446baffd6808185554f8ae541e4254ecb1

    SHA512

    392b79a63b451495cc81877c288c0068d6c159bf0d7ce9ac0cc290128e57a5a1ebe0569dcbab85433448b3c1928be03cf01300ec7ae99573cfc4ef8c4c9b3cb8

  • C:\Users\Admin\AppData\Local\Temp\F07D8C6A-04B6-4025-869C-70A788D7B5C0

    Filesize

    72B

    MD5

    7cbbc24c29ecef293907d30764b0e3ea

    SHA1

    df262b856dd95329de2519ba593f939436eb3720

    SHA256

    ed5b171416fd26dc5d072848e24394aa609c9b08ada6fbd31337c34a597a2733

    SHA512

    82c9770fbd4cdf5c7c6a10c60acf5534de370cb4a6c7ff23bd8a434aaba4327d48d50421f5f8a5e40a9077128cf9f8a3ed13f63df498066eb3a35d50ac7bb164

  • C:\Windows\Temp\asw-ceca46e0-7772-451d-b86f-0e1e52a09f77\avg-tu\bug_report.exe

    Filesize

    4.8MB

    MD5

    0c0f0ca2bb49dfa3743e9d4156007c70

    SHA1

    042fdfba346a89a83f0c782117038a82b29a28d1

    SHA256

    0e1865702916ae47aafc54c6199e3a73acb735ae888f9a8dd7bc4656268ef9ea

    SHA512

    e15f826ce67d4d5224cdcefc3194a5a9144e152ad16136f5774d2ca29484fc11e778e2e9d114af80ad2a99907bd4999e6eef95c7b7dbbe6a7829d67c1b6bbc92

  • C:\Windows\Temp\asw-ceca46e0-7772-451d-b86f-0e1e52a09f77\avg-tu\config.def

    Filesize

    549B

    MD5

    d74cac8e23617717dcbac5d12be7e108

    SHA1

    573f84282e738e302b822eb9842500bf1b4b3b39

    SHA256

    a7f55316856c9eddb54a08fee7cd386aa07c27034c0ddd784cb0f4fc2fb0c55b

    SHA512

    b482cbeef3789d2c74e8035488aca68b33b395e1c561223a3c9a3cc5687a89cbbad88a84e4bdef8d1a55dfa831089075086362b02781726b55f260727af49052

  • C:\Windows\Temp\asw-ceca46e0-7772-451d-b86f-0e1e52a09f77\avg-tu\icarus_product.dll

    Filesize

    1.2MB

    MD5

    2f8931c51ebbe01d0c1d87d5ad2d652f

    SHA1

    a322fec62bbfe4d8b46199bc9001b4af74bbaf93

    SHA256

    add1dd3fb660dfb534317cb29e18a37e82f4e27000004ef29213914a6b6d5cfd

    SHA512

    2018cbf3179db624de67860370b80c46d8dbf59c9286e24c89e4edbf348720e38080aa1c5f8c6519593960057eb7fb3fa19b490bda5bc5fcafed2654dbb57890

  • C:\Windows\Temp\asw-ceca46e0-7772-451d-b86f-0e1e52a09f77\avg-tu\product-def.xml

    Filesize

    228KB

    MD5

    75fa646c45a8991f3b6978844588670e

    SHA1

    24cd6e97d367b481d173bac4fafc6e0b83f5537f

    SHA256

    6727dd70125f8c3b6f209b8bd08eef1c2b2be322e552720ccc986863d3c2eb11

    SHA512

    3e387b529ce28c6f7332637f57e973cea96a862012a40dc7f50a4e33e6258d67ac7bfce0005263de37633a47b689a10187d61a3202db1610fec4b9bab0e174a0

  • C:\Windows\Temp\asw-ceca46e0-7772-451d-b86f-0e1e52a09f77\avg-tu\setupui.cont

    Filesize

    257KB

    MD5

    c95dc978812b51e1b9aa38c27faf3b1a

    SHA1

    70dee9e4f828652f6be927a193be6938bc175ce4

    SHA256

    4bafb54cd8637586dbfe316ea6e7f9f50010ff021f813128490d2a9c34a89bf0

    SHA512

    5202548902634ee28ce8fdab32f1fb8797881e3643b74d892da0155c3e90cbd98e837a85069c5bf1b06518e8355660486e63abefe41b2a484b4683f29fb1f0d0

  • C:\Windows\Temp\asw-ceca46e0-7772-451d-b86f-0e1e52a09f77\common\dump_process.exe

    Filesize

    3.4MB

    MD5

    c22d80d43019235520344972efec9ff2

    SHA1

    1a2b4b2a52d820f9233ca0201be9ee7f6d82adbc

    SHA256

    5841a3df4784e008b8f2c567f15bb28cdb4cb4ca35c750f1108dfb1ccb6011f0

    SHA512

    f1cadbc3077379a6d7e36b8cf3bc830f44b5e668d4a6c0ce6b62bde292498c4f41c6588c5eba2599aa67524acfd125b7f23c419ae2b4a8e4afea7708aad83edc

  • C:\Windows\Temp\asw-ceca46e0-7772-451d-b86f-0e1e52a09f77\common\icarus_ui.exe

    Filesize

    11.8MB

    MD5

    7ebae16a6ea514e55f7160c3539261cc

    SHA1

    ae74b3af4926b6932aea68a32c7c8727d53a94e7

    SHA256

    f27f92f003505dbca839513d233198211860de0ef487973a5ce0761d8e8ebfb9

    SHA512

    f7c7c084517785f21ae0bd82509ddc31e985edbe9e07f275414806afa3f696037340ea0e6091221a5d81250adf170ca0fa4345915d000eaba6034a9db0f61369

  • C:\Windows\Temp\asw-ceca46e0-7772-451d-b86f-0e1e52a09f77\common\product-info.xml

    Filesize

    6KB

    MD5

    ca24f226325bdc68559f6b406eb272a1

    SHA1

    b730d609ca398767f0a1eebe20aceae9cae82faf

    SHA256

    7c73d3d03aa3f302aeedf1abb83d5f82a87ca3c51fad7b1e70b7cf11abfca5dd

    SHA512

    aa3638faf1ee9d52384e32d09ecc1ae328c6ef66c96cf6eac5c537c8fc214cf64df6547e86a0ce5fc5d1af8620e7d16b9c70b813033ed99a874c1eab7208e372

  • C:\Windows\Temp\asw-ceca46e0-7772-451d-b86f-0e1e52a09f77\ecoo.edat

    Filesize

    21B

    MD5

    a6f4b1ef270fe9312c1434e0eedce035

    SHA1

    efec1b16abf8005b9bbf88e14972b4f9075b39c6

    SHA256

    7067c203b4b5c6807c039cb3fd5d92bdd7e154e849a49b2472dab7f86d32b80b

    SHA512

    e5bd609a8d32a8c3b2d5477550529efaa362894d3797b30575ce8a4b73a82af8f918c0c30f7248ffa65dc7cfebf097b42611e6ff858d33583e77a75c0265a723

  • C:\Windows\Temp\asw-ceca46e0-7772-451d-b86f-0e1e52a09f77\eref.edat

    Filesize

    50B

    MD5

    7661652b44b59d2467aa087248ffd63c

    SHA1

    4cbd8704770a52e0191f6c524317602f790446ef

    SHA256

    b3a118b1536058b32659f7d928c0ac96b364a479a535eabe43340aaeccf12c9e

    SHA512

    1786249dc38535b7cddb9c03093816d1b4834210b5341a38ed0be7465e4a69278d1af8640c75c1b5cbb975124aeb62e1136d37a38068bccf18c485ce11f39a02

  • C:\Windows\Temp\asw-ceca46e0-7772-451d-b86f-0e1e52a09f77\icarus-info.xml

    Filesize

    1KB

    MD5

    08079f92fa3d96ed0f3b67967c333675

    SHA1

    52e77c9ed016c843c0252f430d4e075cd88202c4

    SHA256

    067a62778d85c6551cf2e4c96fb12c84b81a2004c82dad803135ec003c03300c

    SHA512

    b54b2943227f296e11680173e79445566e1cacedddc1f4e82fb261e29200e23f30f2823b73edab2e063b6a97be1455dd5ce3ecd9e3f21f8189d418b74bd695e9

  • \Windows\Temp\asw-ceca46e0-7772-451d-b86f-0e1e52a09f77\common\icarus.exe

    Filesize

    7.7MB

    MD5

    97856ab19be2842f985c899ccde7e312

    SHA1

    4b33ff3baeba3b61ee040b1d00ebff0531cc21ef

    SHA256

    2569a72d3a55ea7ad690d708907245c221664c5c88cadbc19e1967135fa40514

    SHA512

    b2f57fd7c482977ebf52b49e50e57f60f1bf87be5bbf54c0dcfb3038c0f46b89c70f10161fab7585d01b90c4fdc00b86932444f32528fed04b514c6746bff29f

  • memory/1820-154-0x000007FFFFF70000-0x000007FFFFF80000-memory.dmp

    Filesize

    64KB