Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
01-07-2024 20:13
Static task
static1
Behavioral task
behavioral1
Sample
0473b524e21ea497c7be4c40af6b380092443bd647dc336817095a5f504c0b0f_NeikiAnalytics.exe
Resource
win7-20240419-en
General
-
Target
0473b524e21ea497c7be4c40af6b380092443bd647dc336817095a5f504c0b0f_NeikiAnalytics.exe
-
Size
141KB
-
MD5
78b6a3a0e336856187f64585cf3ea0f0
-
SHA1
93b2adc86a79888b1089f79dae18183466d4b744
-
SHA256
0473b524e21ea497c7be4c40af6b380092443bd647dc336817095a5f504c0b0f
-
SHA512
05b5fdc5c56578d574f19ec66d054b80ef95f8a79090756a0fb524b5703127a191af17da65471e890027fc39eacf4c68bbf1efe31b50ea9f55c7773577852df7
-
SSDEEP
3072:7D8wMT6/JO6SaqLRuNw8niD0LdkD85eL/K:vMT6o6xO8ioGw5eL/K
Malware Config
Extracted
urelas
112.175.88.207
112.175.88.208
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 3012 cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
huter.exepid process 1088 huter.exe -
Loads dropped DLL 1 IoCs
Processes:
0473b524e21ea497c7be4c40af6b380092443bd647dc336817095a5f504c0b0f_NeikiAnalytics.exepid process 2436 0473b524e21ea497c7be4c40af6b380092443bd647dc336817095a5f504c0b0f_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
0473b524e21ea497c7be4c40af6b380092443bd647dc336817095a5f504c0b0f_NeikiAnalytics.exedescription pid process target process PID 2436 wrote to memory of 1088 2436 0473b524e21ea497c7be4c40af6b380092443bd647dc336817095a5f504c0b0f_NeikiAnalytics.exe huter.exe PID 2436 wrote to memory of 1088 2436 0473b524e21ea497c7be4c40af6b380092443bd647dc336817095a5f504c0b0f_NeikiAnalytics.exe huter.exe PID 2436 wrote to memory of 1088 2436 0473b524e21ea497c7be4c40af6b380092443bd647dc336817095a5f504c0b0f_NeikiAnalytics.exe huter.exe PID 2436 wrote to memory of 1088 2436 0473b524e21ea497c7be4c40af6b380092443bd647dc336817095a5f504c0b0f_NeikiAnalytics.exe huter.exe PID 2436 wrote to memory of 3012 2436 0473b524e21ea497c7be4c40af6b380092443bd647dc336817095a5f504c0b0f_NeikiAnalytics.exe cmd.exe PID 2436 wrote to memory of 3012 2436 0473b524e21ea497c7be4c40af6b380092443bd647dc336817095a5f504c0b0f_NeikiAnalytics.exe cmd.exe PID 2436 wrote to memory of 3012 2436 0473b524e21ea497c7be4c40af6b380092443bd647dc336817095a5f504c0b0f_NeikiAnalytics.exe cmd.exe PID 2436 wrote to memory of 3012 2436 0473b524e21ea497c7be4c40af6b380092443bd647dc336817095a5f504c0b0f_NeikiAnalytics.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0473b524e21ea497c7be4c40af6b380092443bd647dc336817095a5f504c0b0f_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\0473b524e21ea497c7be4c40af6b380092443bd647dc336817095a5f504c0b0f_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\huter.exe"C:\Users\Admin\AppData\Local\Temp\huter.exe"2⤵
- Executes dropped EXE
PID:1088
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\sanfdr.bat" "2⤵
- Deletes itself
PID:3012
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
512B
MD5cb8b3268a58e3e3ea046135a31630bbe
SHA19b24e0f46375148ebc245cd6641773e876513ca3
SHA256fea32526c29951c22eccfc3f837610c29e2843334ef0734f9b68495c14859d0b
SHA51249ffead156c03719527f8459892e29ec2d7f9842042e885775644ae622d6d4a2746e64c903e8979590631c397f65ba9e59861f89fbd9c3cd2e775c7c933cb746
-
Filesize
368B
MD587c08bc48c21598ccdf555a06ee76e56
SHA1e1cda0f01b53753bd0c891a66ca20e18ef84507f
SHA25641b6d97d011e1776e7f96c64c697eb1afb412bf87a7c3e444bbb416b3b7b132d
SHA5127125fcb9ecdfb961120146f4c64852b2662f9ebeb2b7f8e2616f4f29e2df31aa5fc7025702c9a4138a7918b70f6d2606b9136dc1ffa2ce0ea4185b8139c7f0df
-
Filesize
141KB
MD56abd1df5885f8db64c4a29389f5bedf0
SHA162c1ba8af3053c151a6e93a99c15a40a8cd6cbd0
SHA2562d8087550d2980707d760937d0fe69a8d2b70995634c1b830621ee3963accc12
SHA5129a4359b79c000cec7d754bb41a1b4f595b7ea86ebba1c4ebd8fc46c35db2c28f895d29aa4cbdbd8fa6604f5f1a0a3c28a33110626ac1f6358fd76f1c24c6a306