Analysis

  • max time kernel
    133s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    29-06-2024 14:04

General

  • Target

    ae95eab8a8d6f85879e4e7c9492efa695d5ee874f641e546b2ededafffbf4069_NeikiAnalytics.dll

  • Size

    244KB

  • MD5

    096c57c1c99345e4d680956282e2f5e0

  • SHA1

    ea75c82c608335a1e4ad4394aa7cf1888592c9f3

  • SHA256

    ae95eab8a8d6f85879e4e7c9492efa695d5ee874f641e546b2ededafffbf4069

  • SHA512

    3d11468c931da53ce303d2beb92b191b8e9a1096e712fcb79840a07069c7f73f8e5291799e38a52f325cda419023ec014b481b005c17bc9413c4a87a7079858d

  • SSDEEP

    3072:uwKVw2d7nOHc18WFyBMquAA1fhPKSfAUN3CFPl3ubvD22L2rf1dVEla2xkd0:xKimLOHcTkO6oPKSSuO24WlaK

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ae95eab8a8d6f85879e4e7c9492efa695d5ee874f641e546b2ededafffbf4069_NeikiAnalytics.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1932
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\ae95eab8a8d6f85879e4e7c9492efa695d5ee874f641e546b2ededafffbf4069_NeikiAnalytics.dll,#1
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:2092
      • C:\Windows\SysWOW64\rundll32Srv.exe
        C:\Windows\SysWOW64\rundll32Srv.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:1952
        • C:\Program Files (x86)\Microsoft\DesktopLayer.exe
          "C:\Program Files (x86)\Microsoft\DesktopLayer.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2116
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe"
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2612
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2612 CREDAT:275457 /prefetch:2
              6⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2624

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    e51a439b476c4973bfefe2a11b34bc07

    SHA1

    a8391ccad27b74ba11a701f4b325bdd03a184823

    SHA256

    025312c7b937aaf81b5ed976574b314847c3cd465664d319cef395cfcf3bda0b

    SHA512

    b3d7f77478c7bbca4dfbbd5d24953629d90dfcc0bd2698aff7999f6f5fd26a40269205b8693fbf0767b64d8bfd33cdb24c4b2651ebc260a51bfae7a3c3e27960

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    7c5537b1f00ab53f348721600af5d905

    SHA1

    0a819256fc7df9afe36ad255b2bfd43bbc57660c

    SHA256

    78baf9ebcc1b1eeec6513de79290be34ae812eabc353f89481f109827b907e41

    SHA512

    8d88648a10e7fcaecbbae2d189db64e1bddbd4bee0616575cc418c3caba1ab807ca7e0a5b1130729982d6322607f28aedcb5885393bce329046b5f490f238179

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    887ca0cff5de0dade4dff13422a146ff

    SHA1

    1bcdea193cb311a1a1c5b3ef95dad09bbe0193f6

    SHA256

    007647012a82b209ba27de40c761b2a0dfa0710460260496dae669db22d06867

    SHA512

    c9a21e7bf58513b454ada99775b7fc55207ba64d7303b55ede513a566ba632f45d7647532bfd395b76c33c884bd6cffd213bf69d70d041245df11b82f66148c5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    de52d3a6390be56c692dac33d1e1580c

    SHA1

    f4c71559ce538ba6ce05360afa4eda6553895d5c

    SHA256

    3e6c367e564b5395430e672249716849cb699bc5aca0d726526f36d416956b4c

    SHA512

    a195ff10a0bb6cadb00f4a1c9198008909373b6b0b162d129369dce71b2763bc8933f57b50ee2813e10088b2cff3dffdd659da4d45dfc29900c3991bc812cb8d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    d9af2ca4bb9e2b76fa16e7afca9b04b5

    SHA1

    4a9cc8dcaba898e87db0c2a078e088e97502e023

    SHA256

    5054fdf81a4745a09cdaa2353fe5c7d42f64f8930399c4bfca3aee1077b33f34

    SHA512

    9761c4712e3c94ee7b9a421814fec2ce9f6da9df5b818f24468b974943338f895543051cfb18630ed4d541df8ab52cc65ca112d6c5a50c05fa0fe47fd4c208f8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    5aa8421b265fc0fd94f2b847b2569d2d

    SHA1

    c68b50bfed71cbee27ae5b4d5f16917b336e77fb

    SHA256

    8c088d25cc9270d8f6eb04afa50f974a735fc50b094490ad2f0db63a09718546

    SHA512

    ca944cf7657a295792d0c4d8e132398c2c4bf042d0ccd33f65d09c7b310f695d95dbf9ba55df346fc199955fe7756a17be7040b917244ad25915ec037cbf87ea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    1f4a1f7fe573afadbfff412d57294bf6

    SHA1

    45684659a87e3088b6fa2dd33ecb2a4599651c35

    SHA256

    cc8e20f19633a613540b5571b38b6ab7efbd4d9af8d69e119359464b422b0a74

    SHA512

    277e9a0f5fcf7d4fe7dc649b05c070ac42ac180f34410723a6fc9ace29767804053eae4191ca81ecb7eb2fc885004dd720f08e4737df991d3abd0cf62570aef7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    91af0ba5d1962ea8966d2273327c1abd

    SHA1

    9b66b59254212e498c3d5ec80e768c6f76becd86

    SHA256

    a703eb00ebb1d327d887d9814dc516400b008d25a29c007e0199ef920ebc1dc8

    SHA512

    a667a305159cbaaaa96e6fcc258357b16e4ebbf1328caae250b2c3da2e7ac6f7965a9c70ce39a3621c0fb10027260224f1e9d047b173bb27cb68059f54680d13

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    f7a5adc5da4f094cff03a411c31a660d

    SHA1

    f0e7bbbcde5d18ecd014881aab15e42eb1fa8d01

    SHA256

    023148e56e2423f0cf22c34efb43229c72ff1aaec0ff478ae548ed4e7e3f3d90

    SHA512

    305f9b7a8af8b2f1f4bf5e054499d3d9236be48a0f8af73977b6ad29f0a34afc1ed0f7cb0bb8c961af0b67a1b6e05c616b63aa6935de510235308b43b8058a24

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    0227ba82d99582e27fb22a7254e3e5ae

    SHA1

    cdd72fb5e9daca99ade921cbfa99398482b48f86

    SHA256

    0e4acf90192830a32a0d1e3a154e9c48109911a6d5141d48a76ae48c732d1147

    SHA512

    49e1b5256930a806dcbf1b8ddd54bc4b5c14d9f1f81ed9f6d75a71594d1a0da0bef5895edc4a3387ff694c3e714eed69647b3667ff33c048d73c93b143fc78ea

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    93049f175f8f01017e62ce1330ccedab

    SHA1

    07668f64df61943765aaac4b9b3c0b327ca4c5a4

    SHA256

    7a30c47c303f96ac014053d63b0d3f5b0145a4415afe341bc4c08e6a8d2a5c24

    SHA512

    3e6326058016b3b1a45ceebdb44daddab1a86d25f0c06437adbe9c4f8c2062616da19d90797f84bf9d92f5000630d7caf85a2af492b16e0432d90e4c452bae9a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    00d4b673e8e695adf6050197229d24f2

    SHA1

    070987d882c93a89e9f1e7d181fa658edb136749

    SHA256

    8820b21accd4d56382c244c250c736eda9de34786a9e8857462126e1502d6f96

    SHA512

    961d63628d48d065fd559edf2f352d6cff97162558c2e02debd73a9ae3c5ba593a45510e903cc81fca3d80336e50c07f5b3024fadf617b3956dd44d9863656bd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    77182f7004591a0e49fcd4c55a5d33a2

    SHA1

    34c61eca186998ae67cb4d7604595c1976fffd80

    SHA256

    88a19299b60b3369c7accddbabf6057120f304621a64c1caca31f061b49dd0b9

    SHA512

    bf9a225f7cc4c4cec0b7f27a0de0dfbf58bfe6871fac7cbc298f87401a765d41f20dcac0dbba8af89a748736b3cb8c799840b22a91fd499d5c520f862b0a8ab0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    1d2fc3ec3109428fd1b0136239536cdd

    SHA1

    9c864ac8048cfa156e3a426723cc110fc6153975

    SHA256

    f3d014a32e7be6377b8485b23e7f3fc8600afa5bd3c0e732228c57e2b89defd1

    SHA512

    62f77956af076e3768426f71267e68aaac57cbd0d9f61d744359ed1c09fd8d2a58c9d17e9f05422b86661f8d959a05bb5c565ee426d1072f34b43842ef3a41f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    4a17edf1c7f9dc4c850fba2131470e27

    SHA1

    70873b8b3ba2c73be95a01d3c15192c34dc3bfee

    SHA256

    23ed5a2e30b6c5527a2fedf6ed213ecb5605dca12e50a3d34d58fbf661de0120

    SHA512

    70f691bd2da81ce7afe7024c71281bc824cd269f0f8bfca6fa85a1ba336f45ee509dceb22b1a396d899c20d1586cae388c6c0387c85f254ace431e815158547d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    33ff4c73fc8052c23040ebe3913fe051

    SHA1

    f7916376cc2b0ab8dbfaaea9070269b7277a1fd4

    SHA256

    fbb1f1440d891ddc9d2e69aff8bf399cdbea0999d6afb1bf9b1873543ee7fd3c

    SHA512

    8f78776f9cc914a74a4eba8150cf9ff72482b2b0ada7fdf52844c6bdade4d3115755d4431bab2336a1b2ba1710b5da2c2eca12ec30446f81ca85b32c531abc7d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    b6de07c9ef668d567fa2f176ce10f88d

    SHA1

    60fe87b7ed72358d1da8aad64b9b631c933196fb

    SHA256

    ca8de79aaacbd83ba7c0a6997cc5b36b73d82f4c1ae5101cbad16e2b7f45f911

    SHA512

    84d8133566752e18d97f869ba93eca42fc8a9c4f40f7170a4fded3ff89b1ed3e0bf81cbaa55eb4b8f1856d3f586a52c4ec51dadccd3664ac55a19df093a2fcd8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    cb370572b620068eadd800a47b03f819

    SHA1

    9c30298cb17922701200b5aadbb565962baff860

    SHA256

    ace2a6f706336e121145a3553b78454e41aa11a0c482152c158791f8eaea5555

    SHA512

    58557d7a8fd39bf2920a7ca5d41db3c879314845d5cd36056e3ffa519bf51c4224cada2a0fef695579528563a182fa6cacd20e057d2c9507331fe8af040474eb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    a8f1fb0e0ce40a066060ff7bc8456616

    SHA1

    6e3316cb514e536d6f4b0bae9b9dc6ebfead6da4

    SHA256

    2be844154bf69c6f57640198ba4f48dd8d1ab4b5cf5d6974acca526a6b455fb9

    SHA512

    3910e1537ea5cb44727bfeb3e367d80e71662b86ada87d902ede0a79a9233ceb609241802b36ce7e365ca8d1c4f26b4471806b4ccc3e31fc8ba0ab9cad44354b

  • C:\Users\Admin\AppData\Local\Temp\Cab3009.tmp
    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar30AC.tmp
    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Windows\SysWOW64\rundll32Srv.exe
    Filesize

    55KB

    MD5

    ff5e1f27193ce51eec318714ef038bef

    SHA1

    b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6

    SHA256

    fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320

    SHA512

    c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a

  • memory/1952-12-0x0000000000230000-0x000000000023F000-memory.dmp
    Filesize

    60KB

  • memory/1952-13-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/1952-9-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/2092-450-0x0000000010000000-0x0000000010040000-memory.dmp
    Filesize

    256KB

  • memory/2092-3-0x0000000010000000-0x0000000010040000-memory.dmp
    Filesize

    256KB

  • memory/2092-5-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/2092-0-0x0000000010000000-0x0000000010040000-memory.dmp
    Filesize

    256KB

  • memory/2092-2-0x0000000010000000-0x0000000010040000-memory.dmp
    Filesize

    256KB

  • memory/2116-23-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/2116-20-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/2116-21-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/2116-22-0x0000000000240000-0x0000000000241000-memory.dmp
    Filesize

    4KB