Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 12:04

General

  • Target

    50cb36709c3bcfa8cabeeb06e8bcc6a156a54a79650a34239fac447f6cb8e2f2_NeikiAnalytics.dll

  • Size

    65KB

  • MD5

    9f8bdc9708f2c96205d9b02f4abdb370

  • SHA1

    264115a7509eea2f1d5c1e7220eb5209c2354b05

  • SHA256

    50cb36709c3bcfa8cabeeb06e8bcc6a156a54a79650a34239fac447f6cb8e2f2

  • SHA512

    17715c9162a161dcf2fdb2a44ad54951fc625d243bbda9c664e97d558acde25776914d0233b3927ecd3967595c22e1e4f48acb6499fff5f202c6db1890e77965

  • SSDEEP

    768:xqUHit1rrjyG4Iwk6rK7oEM36l65SgBV3v+1DS1gs+WlO5cs7fry1cAT6khwgUf:UnDoK7k/Sg7v0D3Wps7frlzk

Malware Config

Signatures

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Modifies registry class 61 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\50cb36709c3bcfa8cabeeb06e8bcc6a156a54a79650a34239fac447f6cb8e2f2_NeikiAnalytics.dll
    1⤵
    • Modifies registry class
    PID:1576

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads