Analysis

  • max time kernel
    149s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-06-2024 14:17

General

  • Target

    aeed1ba6715a0fcaf520b8bd4c42ad578cbb69e769f141a5ec0c6ed90f272a8a_NeikiAnalytics.exe

  • Size

    493KB

  • MD5

    973585b0634a699d8e4c2207845c2b30

  • SHA1

    bf8932cf921e43886e96d410f8e29bcb34c83612

  • SHA256

    aeed1ba6715a0fcaf520b8bd4c42ad578cbb69e769f141a5ec0c6ed90f272a8a

  • SHA512

    3e1e2f80efacd41c908dd6dba1a820b630bbb107fb7a283b0eba4dc156d409cc7515dcaae5b995a370d0feecb202041c77703665e4a0fd05e002489f87a67621

  • SSDEEP

    6144:CPkWcDpi78KSrafqV5areuyFwBqgmGNGXN/O8OCLoV7ajfj/ozUr9z9cLVfWBa5M:CPlc87eqqV5e+wBV6O+8cftz94976f

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    PID:3420
    • C:\Users\Admin\AppData\Local\Temp\aeed1ba6715a0fcaf520b8bd4c42ad578cbb69e769f141a5ec0c6ed90f272a8a_NeikiAnalytics.exe
      "C:\Users\Admin\AppData\Local\Temp\aeed1ba6715a0fcaf520b8bd4c42ad578cbb69e769f141a5ec0c6ed90f272a8a_NeikiAnalytics.exe"
      2⤵
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:3748
      • C:\Users\Admin\AppData\Roaming\dvdphost\dialNAME.exe
        "C:\Users\Admin\AppData\Roaming\dvdphost"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4960
        • C:\Users\Admin\AppData\Local\Temp\~35D5.tmp
          3420 505352 4960 1
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4440
  • C:\Windows\SysWOW64\dialexec.exe
    C:\Windows\SysWOW64\dialexec.exe -s
    1⤵
    • Executes dropped EXE
    PID:1872

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\~35D5.tmp

    Filesize

    8KB

    MD5

    86dc243576cf5c7445451af37631eea9

    SHA1

    99a81c47c4c02f32c0ab456bfa23c306c7a09bf9

    SHA256

    25d2a671e1b5b5b95697ac0234ce4d46e0d0894919521b54aabebd9daecf994a

    SHA512

    c7310524f9b65f811146c1eb6ae944966351ac88a95fbc1ac422d8810730e5e212a7e28090ad758ea23c96ba38073e7fcf42460575e7f09dbc759a45c5d5a4a4

  • C:\Users\Admin\AppData\Roaming\dvdphost\dialNAME.exe

    Filesize

    493KB

    MD5

    b88bca7834f42d1dc29ba9535a2d68c2

    SHA1

    0f27bde39ca26b7942f8e94d790131c8ed0d3bb9

    SHA256

    05d9540698036b52675598355030c9ead43c4b0c548c35b88f9f075fcbaaed68

    SHA512

    8e003ce7567cd6ebff66a50fa36c55353ee00c3f7c169afcd7a4276f4a16bb96f5fa2dc7c5c8951207c9feb28316bc65445667345f73e59a6f9e1a908fd494c6

  • memory/1872-19-0x0000000000560000-0x00000000005E4000-memory.dmp

    Filesize

    528KB

  • memory/1872-18-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/3420-16-0x0000000006A80000-0x0000000006B0B000-memory.dmp

    Filesize

    556KB

  • memory/3420-20-0x0000000006A80000-0x0000000006B0B000-memory.dmp

    Filesize

    556KB

  • memory/3420-27-0x0000000001FA0000-0x0000000001FAD000-memory.dmp

    Filesize

    52KB

  • memory/3420-26-0x00000000006F0000-0x00000000006F6000-memory.dmp

    Filesize

    24KB

  • memory/3748-0-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/3748-1-0x0000000000720000-0x00000000007A4000-memory.dmp

    Filesize

    528KB

  • memory/4960-6-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB

  • memory/4960-10-0x0000000000660000-0x00000000006E4000-memory.dmp

    Filesize

    528KB

  • memory/4960-8-0x0000000002010000-0x0000000002015000-memory.dmp

    Filesize

    20KB

  • memory/4960-28-0x0000000000400000-0x0000000000486000-memory.dmp

    Filesize

    536KB