Analysis

  • max time kernel
    117s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    29-06-2024 02:52

General

  • Target

    53e1a328fb3f65e9333680d30d858b662929c2e470867263b2fb529db3eabb6c_NeikiAnalytics.dll

  • Size

    208KB

  • MD5

    39d1d9664b3bb7498b081ba7f52459e0

  • SHA1

    43e931597688d4c345465ec19fa81f0139832ad2

  • SHA256

    53e1a328fb3f65e9333680d30d858b662929c2e470867263b2fb529db3eabb6c

  • SHA512

    85b149893d47058be3a4c086689ecc79725a236c33087a3e8ce6cee5f32bb6576bec68392401666941a443ba932a2f97639b819eb486ceb25660b84f76238bb0

  • SSDEEP

    3072:uoUNFPWRUR6Juy+CAPsx5EAhgPKUFM1FS3eEu+p:LUSImNvD1dFzJG

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\53e1a328fb3f65e9333680d30d858b662929c2e470867263b2fb529db3eabb6c_NeikiAnalytics.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2336
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\53e1a328fb3f65e9333680d30d858b662929c2e470867263b2fb529db3eabb6c_NeikiAnalytics.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:2836
      • C:\Windows\SysWOW64\rundll32Srv.exe
        C:\Windows\SysWOW64\rundll32Srv.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:2136
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3004
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2120
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2120 CREDAT:275457 /prefetch:2
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2572
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2836 -s 224
        3⤵
        • Program crash
        PID:2172

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    b5ac807375e1bc0cd69897ae454c9d71

    SHA1

    1e46635fa1da9e15f5cdeabf56ccbb5c5837c65b

    SHA256

    e2655197d32e8df468cfc7addee7ef19544cc3713fb15870d744c13bd9103d63

    SHA512

    6e30994a4e55a611ba293c41103ccabea65c241442c30027b426ce51f921aa56f374e8dcb69acaa4e0b7bcc047e4e323b20669288f97165fa44422cb40e458a1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    4ca074a347350ab4f285361ac7b56e69

    SHA1

    90b2f85429537c07ae13086282282734834a768f

    SHA256

    fc04c4faddd41a5902543c5389a7526c47752bf99be410daa1471ff5f1f3262c

    SHA512

    0f9d7da0553a140bbe7c145ab65e3f2c13fdcde63a86148ca333184a1fc3c5613c796c7c1ced3c3c23ea270362bf16b36501ee25d454a93e0f38b5e560993303

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    ad0b0a41a70eff3b8abac18e96aa9bca

    SHA1

    7a78f75548bdebfe24824d01097b15d3f45b4426

    SHA256

    d31f385a7fe94f7e2bd29e15c1f54317af0e17a94d8b48d35d592869286e681c

    SHA512

    07bfe60b8a7e8d01d7bbdf6b80a7f0b08d6fc42f2ae51f4ea896fab14599d91b449f86f207fddae71fb117e5f9e5a59c538a36a32daf8fa4bf39a57d912dff5c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    3029c6e0856be0a456d8215862cdebdf

    SHA1

    16ef9583369363ea9f3ae93a7d2699d86270bce7

    SHA256

    9d09b076ff8e644412afd3ba9e3aa600ab3cd4ad9d0de87b48db5f5fd1eb3c43

    SHA512

    2bee9ff7e043bf77b42e267b780340036092d6c8ff832dd1956f281dfd128d244b7c858055abc9b5ded11d5ddd57e56922a8f809a0cfe20e7cd25e9815d8e8a0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    0822f6e52765a07c2a7b432479994dd3

    SHA1

    6c62d237597997ade08ce83a896b97a271d896a1

    SHA256

    185ace8113454010207db5e34908c9a51b765ef10b729ac5839a9afd9cfe9d87

    SHA512

    65a07c228ed0fcb984cb199b45e3d79fc36cb96487b114615228c25f123d7e3fa8d11475f564497a875d4e1cf81cbf99719340807ac94629caa00fea4716ce32

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    90fc6739c3304131c99a6fef0ab0f814

    SHA1

    87d1dcb8f3b7a2cfa55c6f6e67abdbf6b7c07f07

    SHA256

    2d40840d6e1eec851c2dcc6016008a50717f043144831abcefaf3fac1b1e7ea4

    SHA512

    7d20fefc967c28d9e75715fa429bbf672c19cab78f5a0c65272c9c024c5d04dcfb82893091e13e1f82a5e556e1fa189dea779629dde0e47e15a02dda39cc5ac5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    acadf533afa0c56ed73c16263082ea7e

    SHA1

    a152b9549c7363fd777da230f950701abbb58c5a

    SHA256

    bf86ceb7f5e78bd2006191c58b95bea890c7effda50d952783520697347dfa57

    SHA512

    e57510c54822172d531ec0f2f3ed3b6ac408641d0407e176f0e432a526f912ca82e4d04455c0ff44598aff03a6030f709f5cfb4e8ffe9f6b6a449163f8b25a7d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    79225e7305143fc5d5c068fa20c21af2

    SHA1

    2c9e95c0d767b982ed9900645f787605f493736b

    SHA256

    50d4b8c62e7ea32a2a99b8c75aa3b9a22925fcf0d9dafa7f82bfca2c7dc45415

    SHA512

    9db34b0289ffc760ca3825952e97c6fa66503dab630a7a1cdb96c695d5615809c5f2fd935234f6279742a2e0322e3fd3192741509beb66e9d08f8151451ae4f7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    28ac574040ac43b5b05f3595475bf3f7

    SHA1

    a5d3ec4edb576a8cd4f97962ee8dd51e6ac20c8b

    SHA256

    9ae09e80e9176c9d5c543287551d1d9b570f08092177bbd5571da4f998013837

    SHA512

    3532c5b8db9ac8635339dfd9a522b82b679a6a1b1c2916d043cab8f10186ee1a49a9773689c05b97cd948bdc56f5dfcad60ce1bfd7f04de63cec2d651db4cc0c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    3946844761b3215716e23fd0d004a03d

    SHA1

    82781241bab7ee803d0a1a41d8dc3c159ad3557f

    SHA256

    ea526d4ff07b51335f4df10279e9f8f53a72adf1ef49853d94d3fa643848b905

    SHA512

    09f9de86497453e9a493534e5e8498cf2727d172bde54ac850b5ff5c9a3120a5172ed145992e32ad3acfae2e0168e983bb873874ce47c0ca96c9c4b2598bdfe2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    dcac71898eea72888b0c6e498e28299e

    SHA1

    9f07852a9377034d0bab688c8a3ef8a5b7a9f197

    SHA256

    00f94af3cf1b82b5cae0667711ac13ebae07252d9d7d7a52efbc1f08529adeda

    SHA512

    1e4dba0fb0257a9a4c006590e40e436f2d13f66b1ce5d85977d5cd906f2690fa76294660f1447c7bfa23214715f5c393f1555d0a76bcfb047a39261c25bcada6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    bce8dca2549e76f136d11e6d192db08f

    SHA1

    fa8042ffc7151a47d8285a25f798260256278b6e

    SHA256

    539876fad374a4b476ce8a4414bc7a428344ecd94a6170de5fd67c2484bcddb1

    SHA512

    f116f3726abc45ebf2257e9c639a5e4e83f3cd4249fb29edc024fb8068ce89ba829328cde1a4d986201db85807e35041281387c3b94bffd3df038c9ed127cd88

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    52b4a38a782d84129e04611a4a5ce64e

    SHA1

    838905bf1f7463e91f312541fd5b6a6719efeea9

    SHA256

    b374a5707b03789e67eb70e576396eb4bd07112e699fba2acef110a7bbc08dda

    SHA512

    6726094970c87bcd944516468232935c77bca1dd5af84fd3cebd58c4b4288bab46320d767f97b9e680f6c6767292f0cf65f387b4f12d9fe8620930e1eeb11d59

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    1f5f531eecfc37f066b954486edf3ba9

    SHA1

    83444781cbebb5a253262bf9c6d2a8a7b25d22fc

    SHA256

    f703549f4999e93968c9b41f8666721009d0d51bf55788b6c8f0cbce2abc71c8

    SHA512

    cc7b886cfd38069bef66ec059b7b2121aa5e32f09326e7be84af5d40d0c536da46921a97db407eab25151ea1fc0060bdbaf93e7ad21e9621f34680702d2e1280

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    2a06e3a47dab37ec69fb7e1b7f17d939

    SHA1

    3eb7b277628b5d08ba32ed4b00b8bbffd54ee365

    SHA256

    461c3a4359ef2045336d5c542b6fcd26cd6ef163f620e7a34c1a0dbd1811eaee

    SHA512

    24ea4c4e57dae4ad9bb6a6179746a0781f0bb3eb32a676218486de74cb94b1a21634c1aebb5b6b2bf5bb3048cd0c0c960916bc9391108a99d6b9118148e3742f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    dc9a38461cde1a9261eaa465c1ed2c3f

    SHA1

    73214ea537d6a510328dbb93f30c6b40a42b2157

    SHA256

    0d111e674fcfed1dad26b6060fb5c982171c42fd5bb303875c5d53ab80d8cf87

    SHA512

    d15c799b1ae2b3776ee910c59097106442c11f8d77e98fd7a0911f937d54df01793d941bcc08d9b9ecb18fe7c7dc3de6f9f787bd536713de186cc95ef4da5766

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    a8328a09140d2fb6c4fdc4dad19119d7

    SHA1

    d74c0b16ab1b964f4773de7a36ad7730b54abd38

    SHA256

    40c41957717d088eb0d1a8bd655a9010dfc24cb7c2e6a427cf2e0f9081e1cc91

    SHA512

    cebf8c61bbeade67a4bb5888dafe5d2b7595e0f68f2d8d92cc1b03810798f9b3403ed3a2fb19633c9adb1f9f7028bf0a4d88dbee1b848e085300bf2f060e6987

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    865054371e5845448b702c90c8992024

    SHA1

    c3cef1cacb0b561b3d3a649835b140bf0e332e37

    SHA256

    978471321752d0b2e1304cb63b645da959288a5a90bd8bf5a7ee3dd92b3e2275

    SHA512

    cc15090c62bbb98176c9c35ae3dac8a40347e9b68dc990bfbb1ec13f479be5044efa16e3283763c84547d6114eed92973d324c5d391c227a0c399b5ba31cc8e5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    77c6b58ce27606af94caa817d389d864

    SHA1

    e805a7e8cf2b9207a6e1cc6ab9a57d134bb19711

    SHA256

    9decb5932d2f43b7902c41263bb2ae6aabdb2b6c8a458680d83443003cc03ee2

    SHA512

    713451ee76cae6f8ab90e44f96831d3ccd070b2a7886f4878f39b376c867995b9b3498afa86a91cce2c646cad45b35facf99f6032b3ffc6e5bbfb2810e674a24

  • C:\Users\Admin\AppData\Local\Temp\Cab363F.tmp
    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Cab374D.tmp
    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar3750.tmp
    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Windows\SysWOW64\rundll32Srv.exe
    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • memory/2136-11-0x0000000000230000-0x000000000023F000-memory.dmp
    Filesize

    60KB

  • memory/2136-12-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/2836-382-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/2836-27-0x0000000074890000-0x00000000748C9000-memory.dmp
    Filesize

    228KB

  • memory/2836-26-0x00000000748A0000-0x00000000748D9000-memory.dmp
    Filesize

    228KB

  • memory/2836-25-0x0000000074860000-0x0000000074899000-memory.dmp
    Filesize

    228KB

  • memory/2836-4-0x0000000074890000-0x00000000748C9000-memory.dmp
    Filesize

    228KB

  • memory/2836-5-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/2836-3-0x0000000074860000-0x0000000074899000-memory.dmp
    Filesize

    228KB

  • memory/2836-1-0x00000000748A0000-0x00000000748D9000-memory.dmp
    Filesize

    228KB

  • memory/3004-24-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/3004-22-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/3004-18-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/3004-21-0x00000000003C0000-0x00000000003C1000-memory.dmp
    Filesize

    4KB

  • memory/3004-20-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB