Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/06/2024, 18:09

General

  • Target

    99a47999c39cae04170bd139caab90fe229292e4810e637018e1f1afd7a4d3b5_NeikiAnalytics.exe

  • Size

    587KB

  • MD5

    cf31c96249df4f9d0b8fb251bf0a4200

  • SHA1

    93ab8260cfed1d465a4ade310d8744d822414a8e

  • SHA256

    99a47999c39cae04170bd139caab90fe229292e4810e637018e1f1afd7a4d3b5

  • SHA512

    446f28011ebb00d38527f258febbda33272931d49a8f50459c90019dfe6e69106c1209381f1f3c7c8d7072657906fa0a28d39e1025244a389985ef0aaa1fc668

  • SSDEEP

    6144:vwynAtMrOVRkidy9yIGWlUiPx4O8b8ITDnlznZhJQ5boeDtnx4bYE:vwKfOVRo9yRYX4O8b8ITDnlTO5bohsE

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 41 IoCs
  • Drops file in Windows directory 64 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\99a47999c39cae04170bd139caab90fe229292e4810e637018e1f1afd7a4d3b5_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\99a47999c39cae04170bd139caab90fe229292e4810e637018e1f1afd7a4d3b5_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    PID:3776

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\RCX92BA.tmp

    Filesize

    589KB

    MD5

    9c1a956335cae42acf727be8682367ae

    SHA1

    1b82cd9f4d0466d7278bff044aaa00dfb8a02fcc

    SHA256

    2145bddf193eebe4d8063f75692643bbde28d293c7830af020e714b61ce82049

    SHA512

    3b37afe50ee0f1cd3ed9f427c4a09db049bc0e462af6bdc3ba3021c9482a898d9331a5fc5d0481258768aeadfb0f282cd0f53d3bd5e1d7c7b1bfca40b8609cc9

  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Runtimeccmeecc.exe

    Filesize

    1.2MB

    MD5

    a98f8ef2909357fbfabea3e3bd74c864

    SHA1

    1d264714fd44ef6aecdfc1df185416230e8e1323

    SHA256

    3b7dc023caf96d66461f0c25a556a72ab60223d269c94c673bf401abe1217c3e

    SHA512

    fd8c9da788e131a61f5ad5887112ad100bc43bd5697bf542b1c1193680cfaf9c8fa76f7cc21820b17e4de46150591f1baefd4c08810c3e09a0261acf1a1fa378

  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\UnicodeComponents.exe

    Filesize

    589KB

    MD5

    d92db150914d2ff58f3dea8b152bbf49

    SHA1

    c229d4d2e266e26b2f8696366e997448718b442f

    SHA256

    0b39296d5476cb18e71177c237263a1ccf15e72c76c40628d9e12915bb4800e4

    SHA512

    14295f28ae4576b3e533645a8249543b016ee276174864edd663087b480010b3fb81067c50450ece3bec5b495df8288dc781f57ffb8becca44b3ed15461217bc

  • C:\Program Files (x86)\Common Files\Microsoft Shared\VSTA\Pipeline.v10.0\AddInSideAdapters\VisualTools.exe

    Filesize

    589KB

    MD5

    bbc32c2f1af4c413eefc7c8e911567b0

    SHA1

    067c26f996b12e0c008aaeaa9c5ee25130abe06b

    SHA256

    8fbe36575a832074ad8bf2111d791ebd5da697b83fb856ee42313aa29ae24843

    SHA512

    e2395e369701c73405747f39d8d911e11369d5a0de60cb60e1232c96d62aaf223b27fc8a362a4a05deb93f35f494fd81bc0c5e7c102170ab1b78d2711014044d

  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\WindowsVulkan.exe

    Filesize

    587KB

    MD5

    cf31c96249df4f9d0b8fb251bf0a4200

    SHA1

    93ab8260cfed1d465a4ade310d8744d822414a8e

    SHA256

    99a47999c39cae04170bd139caab90fe229292e4810e637018e1f1afd7a4d3b5

    SHA512

    446f28011ebb00d38527f258febbda33272931d49a8f50459c90019dfe6e69106c1209381f1f3c7c8d7072657906fa0a28d39e1025244a389985ef0aaa1fc668