Analysis

  • max time kernel
    151s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    28/06/2024, 05:28

General

  • Target

    879a6e37fe7dbac702b8e5033568a60e6b921a898a9b83ae04a71b5ec39bbaaa_NeikiAnalytics.exe

  • Size

    53KB

  • MD5

    4cade50f5c013c356307ada7e01f2cc0

  • SHA1

    376fda067c658341485455140f31cb35bbf52c91

  • SHA256

    879a6e37fe7dbac702b8e5033568a60e6b921a898a9b83ae04a71b5ec39bbaaa

  • SHA512

    bf2ebbf683e40cdad5ba1c22abcd9a7a75d8161cd75dedbed8704993e747331dd25b01098fc2faf98fa4c1d091bdd174a0530340144320bdb1e05afb9776737f

  • SSDEEP

    1536:vNpg8r8Q3O4VN1lA7Kp3StjEMjmLM3ztDJWZsXy4JzxPM0:G4VGJJjmLM3zRJWZsXy4Jd

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\879a6e37fe7dbac702b8e5033568a60e6b921a898a9b83ae04a71b5ec39bbaaa_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\879a6e37fe7dbac702b8e5033568a60e6b921a898a9b83ae04a71b5ec39bbaaa_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1156
    • C:\Users\Admin\tuozo.exe
      "C:\Users\Admin\tuozo.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3060

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\tuozo.exe

    Filesize

    53KB

    MD5

    4dd1fc225f92c755eae4f89d57f13f00

    SHA1

    ce8e1d6c93f3fd39074adec166115bc4f3f3c6a2

    SHA256

    d058dd90a3880bbd3c9aa6832dc1c2a31655deb1c7255f1e74e1ce98feedf0f5

    SHA512

    04ca8d0bd8d5eba9df17120e5382de3b5bff2c3692e9840756c9d77a0bf5aa97e826dce1a8e2291e83ce2a01f86711308408934853e79412f80e5520283866a2

  • memory/1156-0-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/1156-9-0x0000000002700000-0x0000000002712000-memory.dmp

    Filesize

    72KB

  • memory/1156-15-0x0000000002700000-0x0000000002712000-memory.dmp

    Filesize

    72KB