Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    25/06/2024, 15:08

General

  • Target

    6f4504eb017ae781659a2e6cd0607f69c09b12f132152cf142e2969be76acc74_NeikiAnalytics.exe

  • Size

    134KB

  • MD5

    1a69bf3b3a4c1968e9147e4d0857d880

  • SHA1

    e0e834a4338f42dfd1f9977c823395fb5e8f61be

  • SHA256

    6f4504eb017ae781659a2e6cd0607f69c09b12f132152cf142e2969be76acc74

  • SHA512

    2d80725f82836f1e39026ddb234c7d7fdafc5f82eb2e4d1cd24926a1d3e83a8b6998417739e358fcf0d65f461bd358eb176d79e1c7525760c103fabf478ed450

  • SSDEEP

    1536:YGYU/W2/HG6QMauSV3ixJHABLrmhH7i9eNOOg00GqMIK7aGZh3SOK:YfU/WF6QMauSuiWNi9eNOl0007NZIOK

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f4504eb017ae781659a2e6cd0607f69c09b12f132152cf142e2969be76acc74_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\6f4504eb017ae781659a2e6cd0607f69c09b12f132152cf142e2969be76acc74_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2716
    • C:\ProgramData\Update\wuauclt.exe
      "C:\ProgramData\Update\wuauclt.exe" /run
      2⤵
      • Executes dropped EXE
      PID:2852
    • C:\windows\SysWOW64\cmd.exe
      "C:\windows\system32\cmd.exe" /c del /q "C:\Users\Admin\AppData\Local\Temp\6f4504eb017ae781659a2e6cd0607f69c09b12f132152cf142e2969be76acc74_NeikiAnalytics.exe" >> NUL
      2⤵
      • Deletes itself
      PID:2644

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \ProgramData\Update\wuauclt.exe

          Filesize

          134KB

          MD5

          ca7b6c480462121b37e35253516d6aca

          SHA1

          9e831e9fb97db79b80ff55d5f2d8617346cae216

          SHA256

          427bd6c9d5e2eb626910272c62a058f75f7dfbdf2dd9191c8b0b2619865236dc

          SHA512

          7025df69e1a774d300d85c1c3328492534573e2bfe7f1a195ff82071491f14beff92c5580988ec16171dc86b04a5f8c3d7a86eae61327230a73f00782bc4a41d

        • memory/2716-0-0x0000000000C40000-0x0000000000C68000-memory.dmp

          Filesize

          160KB

        • memory/2716-4-0x00000000001A0000-0x00000000001C8000-memory.dmp

          Filesize

          160KB

        • memory/2716-8-0x0000000000C40000-0x0000000000C68000-memory.dmp

          Filesize

          160KB

        • memory/2716-10-0x0000000000C40000-0x0000000000C68000-memory.dmp

          Filesize

          160KB

        • memory/2852-7-0x00000000000B0000-0x00000000000D8000-memory.dmp

          Filesize

          160KB

        • memory/2852-9-0x00000000000B0000-0x00000000000D8000-memory.dmp

          Filesize

          160KB