Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    01/07/2024, 10:32

General

  • Target

    4b106955f6256de73a733eadfccdfbb091eb13976acd87c03cad4b03d95d09fa_NeikiAnalytics.exe

  • Size

    41KB

  • MD5

    ad2102e11e756cc22f806b272e8f07e0

  • SHA1

    680e81e0c31246658ed3393e37dc9e4d2bce712e

  • SHA256

    4b106955f6256de73a733eadfccdfbb091eb13976acd87c03cad4b03d95d09fa

  • SHA512

    09fef26009f21c16c9a80d386489173d298a5fc6031736099964443c36729b8a70ec4abc77cf22c376be3be3677787838fcd1f886a3c681847289007c39b6d81

  • SSDEEP

    768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/:AEwVs+0jNDY1qi/q

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 28 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4b106955f6256de73a733eadfccdfbb091eb13976acd87c03cad4b03d95d09fa_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\4b106955f6256de73a733eadfccdfbb091eb13976acd87c03cad4b03d95d09fa_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2132
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:2400

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1a805700fb11d450fd1a24f9b5457daa

    SHA1

    aba8ba1cc2f7a9ea7059e1515d3af02e33ec2c3f

    SHA256

    5760ee142f3e874474eaf75b04972b3e3b43ab12cc14490a40f1e4fa903d914e

    SHA512

    5595e48049fb690103684bb2a744694c32fbfbff23dc31d602cd42134d90acf263d08d7529c6d5f5dc2de8568a941315c72e33d604baa3444d0cd4ecd78a901b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1c989a0b89369234f7f791636164056d

    SHA1

    26432eca68d4da24568e55a750797d3a8588613a

    SHA256

    17556aa163dcc8d3e405ea945547777d9627c043f7f522c845fb64f59206cee6

    SHA512

    c071ec302087e2849c7c3654ea9fd25bede8a1fa7f66df2a6efd768527a47fbc4346c5aa7ed5377c038aae9e42002d8359da318b6737e67430ffd25bea8f3db4

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\G17BROQF\FUFHXHZC.htm

    Filesize

    175KB

    MD5

    1ed086d25d536bc833a439a4a3c9250d

    SHA1

    c76ea99c627b4cbea523231e9d5e522e6125179d

    SHA256

    170f0d34842144ff4977ebc795d27f24d56d306e100ccd2c4427235c5e9942f3

    SHA512

    dc90dabb52339d1d4f1ac824f85152a50be66d52403ac2149f3cce12047a6fb874b5a67b9df5a58aac4c568958ac682037623bf32f0474a8067d13555cf0549d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TTL9DZJ3\search[2].htm

    Filesize

    158KB

    MD5

    74021bcb3315b9f01e08391bfdfadc27

    SHA1

    4f776c258308522cafc4eaa3be18fde111a2b806

    SHA256

    d659dbe0b51c2e55125fdd09515858a17c1538f7198533df12d0c85172a2ba74

    SHA512

    366503f8e3001d82642e3a0c4ce7b101b4c13ad1397d2ad5d3294892b25729697d5d39d348575073fc41bd2b1afd7759e6bec4e52747f628e4443055f2d92627

  • C:\Users\Admin\AppData\Local\Temp\Cab6006.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar60CB.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\tmp62DB.tmp

    Filesize

    41KB

    MD5

    358a4d1ec830187e95afb9e07f8a1b2b

    SHA1

    dae028f1b2b00dbe8f08d8c040447e5217304f23

    SHA256

    8b752bf78f768dec44f5658a19658983e064e3a62a7806de81a9a13afbb0df41

    SHA512

    7637f0ab6f1443f5db90a396f2f530a184b5d4fc7f68e96da436220d352dc0679c2cf36dd7c3a43258a83af38a2962eb775d4e1e2ba0510b0064610ca771c694

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    160B

    MD5

    3c1b8439fcb62e0a80866df974885729

    SHA1

    4ca78d06a83a8a9462e2a530dcc9cd7a8c3765d3

    SHA256

    8d1a4598ffff4b5ac7930ab10fc475117f1c932d86c33e65213c9c48ef6fb1e4

    SHA512

    52b612d40d1646a71bd19df56884f0fba60545168367b0b39fad54bc88a5022cf05685303b6fb9c30adacccabecfcc08d882638c9232d699465875785451f900

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    160B

    MD5

    fde4a391aafa0f12f186986c27376717

    SHA1

    0ddfac21884296138edee9412956f1a85e7e6723

    SHA256

    77a1cc09759812058577c2e81ee8f88a84095bb99f2ec0b5e3fd3122994ce9bc

    SHA512

    4b0a9c72112758602dfbc5776229c701c18de77d03aa8e862ef5394e7d73201e70151662c77e7079bfac717fa071a4f5c36952018145982190f69006ea7a78dd

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    160B

    MD5

    7a24c8903bbc2cbfee7dece360314034

    SHA1

    937c2ae4e669a9397e0276ea7c76f7c051898755

    SHA256

    fb0bd06af2fef925f54383a03c8aab591205f23aad1620e6f5f58d6aeeea832a

    SHA512

    b73d89c841a2f86f6c1346e9f42effed5a07a0ea37444024e77af6494853a0e81791a6d7bcbeecd309f0da8c78876b642d32f8093183ea2e8db33179ab154326

  • C:\Windows\services.exe

    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • memory/2132-17-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2132-42-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2132-0-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2132-24-0x0000000000220000-0x0000000000228000-memory.dmp

    Filesize

    32KB

  • memory/2132-80-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2132-64-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2132-9-0x0000000000220000-0x0000000000228000-memory.dmp

    Filesize

    32KB

  • memory/2132-68-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2132-4-0x0000000000220000-0x0000000000228000-memory.dmp

    Filesize

    32KB

  • memory/2132-70-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2132-82-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2132-75-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2400-29-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2400-76-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2400-81-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2400-71-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2400-83-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2400-88-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2400-69-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2400-65-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2400-43-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2400-41-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2400-36-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2400-31-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2400-23-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2400-18-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2400-11-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB