Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 01:10

General

  • Target

    29f4e5c29f4093719d41fe22050516c55eb3e0fe1e4bc094f7d17a7d8dc357ec_NeikiAnalytics.exe

  • Size

    29KB

  • MD5

    e813059b11abf1e33ee7e7202a243760

  • SHA1

    e73b97ede4f48851e737775635723e57643bbcac

  • SHA256

    29f4e5c29f4093719d41fe22050516c55eb3e0fe1e4bc094f7d17a7d8dc357ec

  • SHA512

    871aa7354cea78c0d3e4462c3d1f6daa742272216042afd12ad655d9a4da2085eb471692826295f96e141ec077ab1c326f4bd16a8bc15c0a280799126e325efd

  • SSDEEP

    768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/t:AEwVs+0jNDY1qi/q1

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 28 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\29f4e5c29f4093719d41fe22050516c55eb3e0fe1e4bc094f7d17a7d8dc357ec_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\29f4e5c29f4093719d41fe22050516c55eb3e0fe1e4bc094f7d17a7d8dc357ec_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1700
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:2408

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

2
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    4200c2389462012db8039b98c1e883ae

    SHA1

    c49a4d5e3852b40629bd249c695421c6caef67da

    SHA256

    2550e876dfd2c77c9a440d8450ecf9c31f092197253eb1bd9935cc1c054a8760

    SHA512

    85beb2cd5611726d9d94266764477a1b597b5bb1a2cf494d331345e35ee8221cea2e7b9b7c0882cda2fec4b835c24cf1270fa89676ea94b0d6a695bb193f325f

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\1M46YZP1\search[4].htm
    Filesize

    172KB

    MD5

    b7e8694e5a21676fb6b19c3fbcfe37dc

    SHA1

    58189feec806880e68fed0fa112aa03a00f20878

    SHA256

    e8fc4cd80e07128c740083c23d3d0b7cb0b5d5d018377d38c834d87c97b61e14

    SHA512

    ab25a585c66926b6b0aad708322d3625067d9ed8848cb4887c4eeca2f1dbaa7ea2e531615fdbea02eb3cc00c37f29d6be1a231422a0ac14383955191786c4fbf

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6F0O117Z\searchDQQBQ9I6.htm
    Filesize

    138KB

    MD5

    919370706386424f7ac33f6987514633

    SHA1

    b627b2f2fe694e37f0235c718057ee01631992f2

    SHA256

    3e23de9e60cb43f6e939dfcda70ce20a2e2bfe2103cc9b94a509a3d9fe742a67

    SHA512

    8be7a68d2c88b5781623a09ca2cf36b7e8742b9845b19bf0a01b8a9c771ab0a3779299f32b4ea7423155ddcefbbb0000ec66136d3618597007fb075648a2fb61

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6F0O117Z\searchNTA9JN8P.htm
    Filesize

    146KB

    MD5

    f1a308e025c9063c84f57a144fd786c2

    SHA1

    b4ef220e69faa689f45045728528484611cd33a7

    SHA256

    e2d47ea5dce6918544370be6b900849224967c16681ca656c621c01a14eacab7

    SHA512

    1129b5a1109934dadbbad7fa424584a92d775ce5bed0f7a55edacb6526fd4bbbab2ce272b4ecbea03dac6d99f7984c1018a5065d25ef4e5e7ecbd74cb265ad75

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6F0O117Z\searchTV30FVQ4.htm
    Filesize

    130KB

    MD5

    9b5c9b56c29b351e6ac93b94ff660621

    SHA1

    3811fa033c4c3aaf29175de0d69fb4da3f9d711c

    SHA256

    8ea16d4113ec4297b446e8948271b6f5ecd3cd0dbced7f3e7fa4409cbb65afc2

    SHA512

    b28e82a53d2d6119f27146cdcadb06c2727759dd5b69d1292155f56f5d71823066468ba0d743331acf09ffee7d8ef4d0baf3b13f622ae17556ec5c6fea3fa6d5

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6F0O117Z\search[1].htm
    Filesize

    147KB

    MD5

    47fb110b6080c848d6fb86d4a8b324a4

    SHA1

    8e8d803ab4350643b61768bcb7bd2dc4ef398bde

    SHA256

    ab3c3a049e8313fc83bfc08ffe022aea7b3fcc2e92744a860f08a3356d9e0834

    SHA512

    9fe7746aedf35fd825e09f536bc2f2d6f2cc6bec056b77ba7097a9a2c2bb519ab061f9a8200d2dd806a9bc34c41b9cd6a061aa0972efd062999ff2163d8d1896

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R54TGSS0\41V2T02E.htm
    Filesize

    175KB

    MD5

    bd2bbfdb762477ad20978315ce12e24a

    SHA1

    cb6c7feea0d904470b12ed7b031ad107e8e85232

    SHA256

    ea1797df4e3dd17bfe8121028c65f010434ac63a015171d39d2bca7994e13b1e

    SHA512

    f07fa6769e50616db9e2ebad979e4aafc0dbf2c00b18aa51ab5c9601b28ae616798132215c37c11e563ec2e032d23456be90e2a263ce8ccb98ac0e1f8c88f68d

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R54TGSS0\search[10].htm
    Filesize

    143KB

    MD5

    d559806e2225fa3d1ffbd8e6d76cadda

    SHA1

    582a967883dd535aa76493173e3f704e8ab88536

    SHA256

    b39caa7cb2572cfd1036e7dcd36640ce619521a4ea8a283a3d70ebbba1871ac5

    SHA512

    7a34ab9b491493e20a0bcfc477fdd2fe8a0a61032df373c415ce43e13b8577de610e95db8d896e994b6b4b8ae141f72669fc46d6ce780c0f85c98a0a4cddf818

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R54TGSS0\search[2].htm
    Filesize

    25B

    MD5

    8ba61a16b71609a08bfa35bc213fce49

    SHA1

    8374dddcc6b2ede14b0ea00a5870a11b57ced33f

    SHA256

    6aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1

    SHA512

    5855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R54TGSS0\search[4].htm
    Filesize

    137KB

    MD5

    a862101074febe4b1e62476fa2073249

    SHA1

    778c2db4eb147daef8f0cac9f903e821499291d5

    SHA256

    95c58c5dc01fb52b2a001790f7386c3b7d99109c5e9333c1653d55d9cafc85a8

    SHA512

    578ff913edf73b754f4f04814ac60b500756299107d8838437e185d2810938e09980af89f0b75a66a8fd663ffd69f2149c555c674ffccf89707b99e9b714c593

  • C:\Users\Admin\AppData\Local\Temp\CabF928.tmp
    Filesize

    67KB

    MD5

    2d3dcf90f6c99f47e7593ea250c9e749

    SHA1

    51be82be4a272669983313565b4940d4b1385237

    SHA256

    8714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4

    SHA512

    9c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5

  • C:\Users\Admin\AppData\Local\Temp\TarF9AC.tmp
    Filesize

    160KB

    MD5

    7186ad693b8ad9444401bd9bcd2217c2

    SHA1

    5c28ca10a650f6026b0df4737078fa4197f3bac1

    SHA256

    9a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed

    SHA512

    135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b

  • C:\Users\Admin\AppData\Local\Temp\tmpF6C0.tmp
    Filesize

    29KB

    MD5

    915e41f071c8eb8bb16d75af999d9747

    SHA1

    bc76c3c111e04ee035b38a5cab9108cbd1375207

    SHA256

    e907f8faffa9455c354e41b137a7b855bf3c5ced563a813c070d754e0831ac66

    SHA512

    e76a6888acdeb1b598efcc17762544d58a4e11fac2dc5c8201287ae4a54eca636a540001f1d3ba2705a52ada7c52afdcd305fa7c04465acd7e77a786dd804ed0

  • C:\Users\Admin\AppData\Local\Temp\zincite.log
    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • C:\Users\Admin\AppData\Local\Temp\zincite.log
    Filesize

    352B

    MD5

    373f7b6fdf17f20fb854d6ecab322a56

    SHA1

    dea2efee737a88c1527c86a71f966f93c1116497

    SHA256

    219a11d8664bc906ca61026a6d947dcbccd686cdbdf2c3090a4c286d80fa7941

    SHA512

    4101126a01eb2443f9c6d101a233c33fb1dcef507326061b32ff6fe893fea14916927e3ba16a8462317eae518863cfa29a34b01aa4c64fe66d2e5480b6b79876

  • C:\Users\Admin\AppData\Local\Temp\zincite.log
    Filesize

    352B

    MD5

    31ba77c0823f0acf3df86465ea141bf7

    SHA1

    a79f3a559739c88f760dcff94052a7ffafe1cc57

    SHA256

    9bb15448c6d448792b599927a7d453037400b0d6c554afc966f1a72d261bff41

    SHA512

    aa8abb5c64437b8d67d15fd7420ea040ec738925b655b753880dca12f4dabb0578f72264263f58d55e00c3403110e46fdc26051e216d8d8d5312e5ac52fb1d64

  • C:\Users\Admin\AppData\Local\Temp\zincite.log
    Filesize

    352B

    MD5

    7abe6c696c6de1dcfe0a606f494e09d2

    SHA1

    993477b87c0e29d60bcd413bf2e1c2c9f9806f4d

    SHA256

    ba4dcad168cde168eace5ec5555935b4b3b65c20d9d353fadfda1dfb451dc030

    SHA512

    a26cb37875ba4091a821b22eedc09c51093455fabf83f81415f2d61d12af09c0e44fb65414f85f2d6499e2acc1751625dd3fc2272caf5a10e8dfa6d4edf74e9b

  • C:\Windows\services.exe
    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • memory/1700-57-0x0000000000500000-0x0000000000510200-memory.dmp
    Filesize

    64KB

  • memory/1700-64-0x0000000000500000-0x0000000000510200-memory.dmp
    Filesize

    64KB

  • memory/1700-285-0x0000000000500000-0x0000000000510200-memory.dmp
    Filesize

    64KB

  • memory/1700-71-0x0000000000500000-0x0000000000510200-memory.dmp
    Filesize

    64KB

  • memory/1700-59-0x0000000000500000-0x0000000000510200-memory.dmp
    Filesize

    64KB

  • memory/1700-416-0x0000000000500000-0x0000000000510200-memory.dmp
    Filesize

    64KB

  • memory/1700-81-0x0000000000500000-0x0000000000510200-memory.dmp
    Filesize

    64KB

  • memory/1700-0-0x0000000000500000-0x0000000000510200-memory.dmp
    Filesize

    64KB

  • memory/1700-28-0x0000000000500000-0x0000000000510200-memory.dmp
    Filesize

    64KB

  • memory/1700-16-0x0000000000500000-0x0000000000510200-memory.dmp
    Filesize

    64KB

  • memory/1700-4-0x00000000001B0000-0x00000000001B8000-memory.dmp
    Filesize

    32KB

  • memory/2408-34-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/2408-82-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/2408-77-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/2408-72-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/2408-70-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/2408-286-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/2408-65-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/2408-60-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/2408-58-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/2408-417-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/2408-29-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/2408-27-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/2408-22-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/2408-17-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/2408-10-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB