General

  • Target

    39670636333c542ac7275a9d3f4f6860f6421cf2b167e489883aab35a77abfd8_NeikiAnalytics.exe

  • Size

    2.7MB

  • Sample

    240701-gcagds1cjj

  • MD5

    d0ced883a0b44e712527eec07f41dcf0

  • SHA1

    629be1a5f27ee4453bd75bf0297a3734f384ba4c

  • SHA256

    39670636333c542ac7275a9d3f4f6860f6421cf2b167e489883aab35a77abfd8

  • SHA512

    b053ff2b41349058fa35ab563039f555b27ea943b5e6904925643c5b68f86189fa8884b95aa2d5eba4e351595de27f60ea07b3c466026275ddfd007ab871bc45

  • SSDEEP

    49152:VtzBOauT0i7ZSQcCG1+bLthSo9/ktjPf4EXzwgb+LquT05E:VtzaT00zcC8ahhSo9sRf44z1/5E

Malware Config

Targets

    • Target

      39670636333c542ac7275a9d3f4f6860f6421cf2b167e489883aab35a77abfd8_NeikiAnalytics.exe

    • Size

      2.7MB

    • MD5

      d0ced883a0b44e712527eec07f41dcf0

    • SHA1

      629be1a5f27ee4453bd75bf0297a3734f384ba4c

    • SHA256

      39670636333c542ac7275a9d3f4f6860f6421cf2b167e489883aab35a77abfd8

    • SHA512

      b053ff2b41349058fa35ab563039f555b27ea943b5e6904925643c5b68f86189fa8884b95aa2d5eba4e351595de27f60ea07b3c466026275ddfd007ab871bc45

    • SSDEEP

      49152:VtzBOauT0i7ZSQcCG1+bLthSo9/ktjPf4EXzwgb+LquT05E:VtzaT00zcC8ahhSo9sRf44z1/5E

    • Modifies visiblity of hidden/system files in Explorer

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Defense Evasion

Hide Artifacts

1
T1564

Hidden Files and Directories

1
T1564.001

Modify Registry

2
T1112

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks