Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-06-2024 05:28
Behavioral task
behavioral1
Sample
546c844f8cfb663c99f6724c4c5a45087a318a464b8b72b60bca4377097f247b_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
546c844f8cfb663c99f6724c4c5a45087a318a464b8b72b60bca4377097f247b_NeikiAnalytics.exe
-
Size
359KB
-
MD5
e1577e0da5c1f73bab67092c37c9fe60
-
SHA1
ee8df12243b3c74da7d9a824c2d85f707193b2a0
-
SHA256
546c844f8cfb663c99f6724c4c5a45087a318a464b8b72b60bca4377097f247b
-
SHA512
34ad4382433f1453d5c8190d06717626d82ee073b941407f002e311b18a3b6096861eaf24aa09c4c3b93a6fcf6093b8a5776f478dc76b3fc93c144fc1dac70dc
-
SSDEEP
6144:c1bYec5C8AAYLxhEmPG7qwmioqVsCqbN0OJXmY:MUyI6QmPPPqVspFXz
Malware Config
Extracted
urelas
218.54.31.226
218.54.31.165
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2596 cmd.exe -
Executes dropped EXE 3 IoCs
Processes:
velom.exebaciwi.exeinafp.exepid process 2308 velom.exe 2668 baciwi.exe 500 inafp.exe -
Loads dropped DLL 5 IoCs
Processes:
546c844f8cfb663c99f6724c4c5a45087a318a464b8b72b60bca4377097f247b_NeikiAnalytics.exevelom.exebaciwi.exepid process 1984 546c844f8cfb663c99f6724c4c5a45087a318a464b8b72b60bca4377097f247b_NeikiAnalytics.exe 1984 546c844f8cfb663c99f6724c4c5a45087a318a464b8b72b60bca4377097f247b_NeikiAnalytics.exe 2308 velom.exe 2308 velom.exe 2668 baciwi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 62 IoCs
Processes:
inafp.exepid process 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe 500 inafp.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
546c844f8cfb663c99f6724c4c5a45087a318a464b8b72b60bca4377097f247b_NeikiAnalytics.exevelom.exebaciwi.exedescription pid process target process PID 1984 wrote to memory of 2308 1984 546c844f8cfb663c99f6724c4c5a45087a318a464b8b72b60bca4377097f247b_NeikiAnalytics.exe velom.exe PID 1984 wrote to memory of 2308 1984 546c844f8cfb663c99f6724c4c5a45087a318a464b8b72b60bca4377097f247b_NeikiAnalytics.exe velom.exe PID 1984 wrote to memory of 2308 1984 546c844f8cfb663c99f6724c4c5a45087a318a464b8b72b60bca4377097f247b_NeikiAnalytics.exe velom.exe PID 1984 wrote to memory of 2308 1984 546c844f8cfb663c99f6724c4c5a45087a318a464b8b72b60bca4377097f247b_NeikiAnalytics.exe velom.exe PID 1984 wrote to memory of 2596 1984 546c844f8cfb663c99f6724c4c5a45087a318a464b8b72b60bca4377097f247b_NeikiAnalytics.exe cmd.exe PID 1984 wrote to memory of 2596 1984 546c844f8cfb663c99f6724c4c5a45087a318a464b8b72b60bca4377097f247b_NeikiAnalytics.exe cmd.exe PID 1984 wrote to memory of 2596 1984 546c844f8cfb663c99f6724c4c5a45087a318a464b8b72b60bca4377097f247b_NeikiAnalytics.exe cmd.exe PID 1984 wrote to memory of 2596 1984 546c844f8cfb663c99f6724c4c5a45087a318a464b8b72b60bca4377097f247b_NeikiAnalytics.exe cmd.exe PID 2308 wrote to memory of 2668 2308 velom.exe baciwi.exe PID 2308 wrote to memory of 2668 2308 velom.exe baciwi.exe PID 2308 wrote to memory of 2668 2308 velom.exe baciwi.exe PID 2308 wrote to memory of 2668 2308 velom.exe baciwi.exe PID 2668 wrote to memory of 500 2668 baciwi.exe inafp.exe PID 2668 wrote to memory of 500 2668 baciwi.exe inafp.exe PID 2668 wrote to memory of 500 2668 baciwi.exe inafp.exe PID 2668 wrote to memory of 500 2668 baciwi.exe inafp.exe PID 2668 wrote to memory of 1828 2668 baciwi.exe cmd.exe PID 2668 wrote to memory of 1828 2668 baciwi.exe cmd.exe PID 2668 wrote to memory of 1828 2668 baciwi.exe cmd.exe PID 2668 wrote to memory of 1828 2668 baciwi.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\546c844f8cfb663c99f6724c4c5a45087a318a464b8b72b60bca4377097f247b_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\546c844f8cfb663c99f6724c4c5a45087a318a464b8b72b60bca4377097f247b_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\velom.exe"C:\Users\Admin\AppData\Local\Temp\velom.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\baciwi.exe"C:\Users\Admin\AppData\Local\Temp\baciwi.exe" OK3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\inafp.exe"C:\Users\Admin\AppData\Local\Temp\inafp.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "4⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_vslite.bat" "2⤵
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\_vslite.batFilesize
370B
MD56970a07e2d564493509ed5a2e3b2dd4d
SHA160194f3632f48bd1b380ed033e78797e68ae4623
SHA256296443ef69e7a8a4061907316e5af23efce45c0339a81eec852b031ab709a8a0
SHA512f908f7bea06794be6e847ce1b2c9898c9efc52e09856a12a4538da4008a5b90b69a81c0f01b62320ab25fa984f289fbf4b3754cf3100efefe0276d40d199c807
-
C:\Users\Admin\AppData\Local\Temp\_vslite.batFilesize
224B
MD54786a1dbbe9e24c58bbd2f00cefdc1db
SHA1f916ce5486981cb0b7a47d8e94cd28fa829c0a10
SHA256705434c8fb0b3403304ae8e364fd06b9fe02ae495f57e025a4a012a7c401ea1e
SHA5123d64b99e364375760c8bdb7ba09082fb66c9017968aabb6c1501b79a106bb25c5b059d9e5d376dd639a1c9efc46ea7471d85c38f6d368743a1db1ad6d8bde1de
-
C:\Users\Admin\AppData\Local\Temp\golfinfo.iniFilesize
512B
MD519d4be6f724527088540b1f906e7cc1c
SHA146c7a81f28df3fc4e3edf33b0690effb4b8ec064
SHA256baed9ae7889834b2dd1b0176189dd7209f749b363b7bfbf4d32640efee15f9a6
SHA512584e2eddf27e2cba60fefd3885a80559a6ce2bd0ff9163d18cf17f210df80e878cb56079f446cc25ff8d610b90611e239abbcb2b54f4e3fb33d1b390e1290878
-
C:\Users\Admin\AppData\Local\Temp\velom.exeFilesize
359KB
MD597d50f45805a49d6b4673bbba3fdc520
SHA118c237a510808f038d36370e0c0d0e53856e7a8b
SHA256e088d7ea3cd428baabda3067d0e48c9bf2952ca9c5fc545b67dd2988b8abf63f
SHA512ebfbf85f01d0d70ef6f6bed38e78e0573159bb7b5e2ccf7ae808492b4b5efd2a2810d99b32183e4a0b51073640fe8d3eabd5499e156f4d13354a3a67fdc7aaf2
-
\Users\Admin\AppData\Local\Temp\inafp.exeFilesize
107KB
MD565e619f5e7f5399bf153c777b4a2604a
SHA1402dd9841e00ff83efe4428ea2a075d237f7d835
SHA2562d8ea7208a36e5c17f40ab688e28766b78d6dc1432193e8b27e3633e78013b36
SHA51283179f19182ebd699928e1acdb75fd335ba3a2d99d1e6f8814ba74868ef8588085b64d41e91585789d003366268876f111ca153a62e5ad76fe5ccf72c4816240
-
memory/500-51-0x0000000000130000-0x00000000001B5000-memory.dmpFilesize
532KB
-
memory/500-60-0x0000000000130000-0x00000000001B5000-memory.dmpFilesize
532KB
-
memory/500-59-0x0000000000130000-0x00000000001B5000-memory.dmpFilesize
532KB
-
memory/500-58-0x0000000000130000-0x00000000001B5000-memory.dmpFilesize
532KB
-
memory/500-57-0x0000000000130000-0x00000000001B5000-memory.dmpFilesize
532KB
-
memory/500-56-0x0000000000130000-0x00000000001B5000-memory.dmpFilesize
532KB
-
memory/500-55-0x0000000000130000-0x00000000001B5000-memory.dmpFilesize
532KB
-
memory/1984-0-0x0000000000400000-0x0000000000459000-memory.dmpFilesize
356KB
-
memory/1984-13-0x0000000002C30000-0x0000000002C89000-memory.dmpFilesize
356KB
-
memory/1984-12-0x0000000002C30000-0x0000000002C89000-memory.dmpFilesize
356KB
-
memory/1984-21-0x0000000000400000-0x0000000000459000-memory.dmpFilesize
356KB
-
memory/2308-33-0x0000000000400000-0x0000000000459000-memory.dmpFilesize
356KB
-
memory/2668-52-0x0000000000400000-0x0000000000459000-memory.dmpFilesize
356KB
-
memory/2668-40-0x0000000003D80000-0x0000000003E05000-memory.dmpFilesize
532KB