Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29-06-2024 10:22
Behavioral task
behavioral1
Sample
9f2758d71d7ca217347196941b5a39a03d2d1015fcd9a126693099d3c8c79378_NeikiAnalytics.dll
Resource
win7-20240221-en
windows7-x64
7 signatures
150 seconds
General
-
Target
9f2758d71d7ca217347196941b5a39a03d2d1015fcd9a126693099d3c8c79378_NeikiAnalytics.dll
-
Size
3.0MB
-
MD5
fe8cf52207d4347cf7af77588e8fb810
-
SHA1
1f9f9ec334d4c4df532955a54e58dba34fd50396
-
SHA256
9f2758d71d7ca217347196941b5a39a03d2d1015fcd9a126693099d3c8c79378
-
SHA512
81af900021dcaa193858c796d7a86b2c0ba6bf3fc0b0e4453efc1195bae64bc28260dfba26d428b04bc19470fff47572d5fad4183fca64882a331c7bb7dff49c
-
SSDEEP
49152:jgSIO8RoCxgUnQ8FImHbChCsdFcl5vdMat9gVgpHDplFnWo5uAYz1DAMWBEDY2Pe:jgXxoCxgUnQjmHb0LTcl5dZt99lFWo/X
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe -
resource yara_rule behavioral2/memory/3936-0-0x0000000046310000-0x0000000046A94000-memory.dmp themida behavioral2/memory/3936-2-0x0000000046310000-0x0000000046A94000-memory.dmp themida behavioral2/memory/3936-3-0x0000000046310000-0x0000000046A94000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3936 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3936 rundll32.exe 3936 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4108 wrote to memory of 3936 4108 rundll32.exe 90 PID 4108 wrote to memory of 3936 4108 rundll32.exe 90 PID 4108 wrote to memory of 3936 4108 rundll32.exe 90
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9f2758d71d7ca217347196941b5a39a03d2d1015fcd9a126693099d3c8c79378_NeikiAnalytics.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9f2758d71d7ca217347196941b5a39a03d2d1015fcd9a126693099d3c8c79378_NeikiAnalytics.dll,#12⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4192 --field-trial-handle=2276,i,5697607538120380977,9987005253899555344,262144 --variations-seed-version /prefetch:81⤵PID:4848