Analysis

  • max time kernel
    122s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 03:46

General

  • Target

    33270120b823cc225606147457f6d086d97b5864450f16546982626902e46443_NeikiAnalytics.exe

  • Size

    7.9MB

  • MD5

    efeb18cb3559a77995618c8d419aee70

  • SHA1

    031813582c485460d3a7ff185502f4cfc3842c2f

  • SHA256

    33270120b823cc225606147457f6d086d97b5864450f16546982626902e46443

  • SHA512

    1dac843eaa518cbd988a4e8923aadf317e018b1ac872f528df799a6244afb9abbc4a62f492af78c1842d22e550da36466bdd383f06ff55e3e051fd930728fcca

  • SSDEEP

    98304:CX9lzMRum1nuqyU7XtPCySwo47CctAWUmDrhyM4Znnf6vP/iq0iuWhiw0cEWaOLS:CX9lzMRum1nQUztPClmtPqq0iZinWpM

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\33270120b823cc225606147457f6d086d97b5864450f16546982626902e46443_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\33270120b823cc225606147457f6d086d97b5864450f16546982626902e46443_NeikiAnalytics.exe"
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2488
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\Your Company\Your Application 1.0.0\install\Your Application.msi" AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\33270120b823cc225606147457f6d086d97b5864450f16546982626902e46443_NeikiAnalytics.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1719546219 "
      2⤵
      • Enumerates connected drives
      • Suspicious use of FindShellTrayWindow
      PID:3016
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2760
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding B6C9334699919FD420047603C14DF4F1 C
      2⤵
      • Loads dropped DLL
      PID:2692
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 2760 -s 876
      2⤵
        PID:3044
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
        PID:2704
      • C:\Windows\system32\msiexec.exe
        C:\Windows\system32\msiexec.exe /V
        1⤵
          PID:332

        Network

        MITRE ATT&CK Matrix ATT&CK v13

        Discovery

        Query Registry

        1
        T1012

        Peripheral Device Discovery

        1
        T1120

        System Information Discovery

        2
        T1082

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\MSIB95.tmp
          Filesize

          819KB

          MD5

          3604517a3e6e69ba339239cf82fc94a5

          SHA1

          c4757e31f9c8a90ee5de233792da71c8915050c5

          SHA256

          bdd1d14c9cb54b19f6a7f37adbc7537ce8fd2f6fa59a74a4a90b08c7979708d2

          SHA512

          c22ffc410886fae221dfee6ab469e44694f87cecce14d505a059f5fe01c1b4e1ad93c15b78c7623e821a37737491e89c627ddae5d03c407a877835ab6d611619

        • C:\Users\Admin\AppData\Local\Temp\MSICFD.tmp
          Filesize

          1.1MB

          MD5

          cc048c7aadc4adf3a29d429f1f5eead0

          SHA1

          6b4d89df901427fe955be2d58ad91a6de30be9d6

          SHA256

          d23c6ac751423ff6961694437e67d7b608102bd351e3e0cd10d34d026a1a08ca

          SHA512

          0e67c0a4db70e19ead49f6c0fd41045f3fd9ee688d75a6da2916e347b70783843fa0e3d6cfc2b0bcd5e16a6045ba27707dff655556ebc725c126082e45cee2fa

        • C:\Users\Admin\AppData\Roaming\Your Company\Your Application 1.0.0\install\Your Application.msi
          Filesize

          4.1MB

          MD5

          c6f2c182d1946aa7c29ec6861fbf168f

          SHA1

          f1f8b2e65d8581f966b577c5ff22a3af081d3994

          SHA256

          6688cc74e524b2b68fae49e66d0e2c718e7d01e591883530bbe32e00d6d93392

          SHA512

          eca4e43c79812578787f68ac912ca863356e0e3a16580d967b3eeaacfef32c53832b05acb57d0da61b55f75f241fe172faad4cc28a75b51383ffff7ca6a214f8

        • memory/2488-0-0x00000000001C0000-0x00000000001C1000-memory.dmp
          Filesize

          4KB