Analysis

  • max time kernel
    150s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    29-06-2024 12:31

General

  • Target

    ab8c00477a8a142a9cfd9e08ec179b15c12905eb1f2934aa6923dd55a35755ab_NeikiAnalytics.exe

  • Size

    150KB

  • MD5

    a218db59526521a9e2e6f5ff3de7a3f0

  • SHA1

    572075ecad019a5d89f2808996c5f8a17cc60f45

  • SHA256

    ab8c00477a8a142a9cfd9e08ec179b15c12905eb1f2934aa6923dd55a35755ab

  • SHA512

    e0c3e977b4e6d52b58c7115b9b7d76519ee621abd71849777615a640f3fe2c8156a1183b2622153cf187a2ed895883e9d1b5f2561c02260c80deadf5ebaeaf3e

  • SSDEEP

    3072:HuuczBGY3j4nLXhfRf70MCRRb85TFcMo7xQGHMOfAVTzXW:HlcEY3iLXXgvRG5TFZoFQaMrHX

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab8c00477a8a142a9cfd9e08ec179b15c12905eb1f2934aa6923dd55a35755ab_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\ab8c00477a8a142a9cfd9e08ec179b15c12905eb1f2934aa6923dd55a35755ab_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Modifies WinLogon
    • Drops file in Windows directory
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2088
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • Suspicious behavior: EnumeratesProcesses
      PID:2024

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\AppPatch\svchost.exe

    Filesize

    150KB

    MD5

    1d66d0315631147e3f626a30d949dbf5

    SHA1

    34da746225325f0036fadf1ecbfc790da8211bb2

    SHA256

    5e5b5dbcfbf8f9f0302e98f52c88aae4ef19e20d83f312f0a5ae7ba2d3d618fd

    SHA512

    51cbb76ed5c1c6f68fe7c71f59b20993c3139dec7412bc854154bb93b5a60bffb25fb69a33aaa8ad002490b6e34c37dd04fd71738168908c553ea7620f80146a

  • memory/2024-25-0x0000000000490000-0x00000000004D6000-memory.dmp

    Filesize

    280KB

  • memory/2024-34-0x0000000001C50000-0x0000000001C9A000-memory.dmp

    Filesize

    296KB

  • memory/2024-30-0x0000000000490000-0x00000000004D6000-memory.dmp

    Filesize

    280KB

  • memory/2024-33-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2024-32-0x0000000000490000-0x00000000004D6000-memory.dmp

    Filesize

    280KB

  • memory/2024-42-0x0000000001C50000-0x0000000001C9A000-memory.dmp

    Filesize

    296KB

  • memory/2024-37-0x0000000001C50000-0x0000000001C9A000-memory.dmp

    Filesize

    296KB

  • memory/2024-20-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2024-21-0x0000000000490000-0x00000000004D6000-memory.dmp

    Filesize

    280KB

  • memory/2024-38-0x0000000001C50000-0x0000000001C9A000-memory.dmp

    Filesize

    296KB

  • memory/2024-36-0x0000000001C50000-0x0000000001C9A000-memory.dmp

    Filesize

    296KB

  • memory/2024-19-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2024-23-0x0000000000490000-0x00000000004D6000-memory.dmp

    Filesize

    280KB

  • memory/2024-28-0x0000000000490000-0x00000000004D6000-memory.dmp

    Filesize

    280KB

  • memory/2024-26-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2088-18-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2088-2-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2088-1-0x0000000000220000-0x0000000000259000-memory.dmp

    Filesize

    228KB

  • memory/2088-0-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2088-16-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/2088-17-0x0000000000220000-0x0000000000259000-memory.dmp

    Filesize

    228KB