Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 08:41

General

  • Target

    440e461600c98e1e7dcf335971ae9bcff9e01c937edb29203550b7ad21d7d56b_NeikiAnalytics.exe

  • Size

    29KB

  • MD5

    e8227d08ef7bdea64871969a0fd1cd50

  • SHA1

    ea74ba3fb297e0e5b5887c4fbf9c51098689650c

  • SHA256

    440e461600c98e1e7dcf335971ae9bcff9e01c937edb29203550b7ad21d7d56b

  • SHA512

    e539e2c2c2ba34ab4ff3c7dd991a77775cd068a46be62bb3cab2d6fd50aadf102ddb34c8b23f4772ee9ec01ea73839dffe603c03b03ef1d66552638f288ced52

  • SSDEEP

    768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/h:AEwVs+0jNDY1qi/q5

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 29 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\440e461600c98e1e7dcf335971ae9bcff9e01c937edb29203550b7ad21d7d56b_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\440e461600c98e1e7dcf335971ae9bcff9e01c937edb29203550b7ad21d7d56b_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2860
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:3016

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

2
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    d6edc0eea8a01e3fbaa6c302c2740061

    SHA1

    f49f12ce0dd2057f8dbb305cd1160371e3b2d621

    SHA256

    46535f82e87e354dcd3c5725bb634f129eaad2c10114098c2e1df2bd814b2cc8

    SHA512

    272f50bae758238a2e07146678406ef18fe06d9cb1d352cb68431449ddf69994e95b51b7f763a4a4e7d7743719aadfb52698cdb0c77257adcee5121ff68c0404

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    9200ef31e8705315c5e6df38feb64b79

    SHA1

    5aa47bdafc18f06bfea08858761c3a8612e8f104

    SHA256

    43f25af564f6bdc7c9b69df9beb77f0a1b1201c45f58bb8fa6176256b005d3a8

    SHA512

    d64bfed05c4cf0142197f9af3498226b1afaa223b1c2b2fa68c3487f8d1b46c8808e0a101373238f53d44246301e3d3ddf168680e5b3cd585b37020cb06ef55f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    342B

    MD5

    100be67f134b55b7ee425e1e7c6e664c

    SHA1

    37dc4f666b44af88bd69e3bfd3220d55fea8e960

    SHA256

    c3090fa9e5805ae678fc08a70e2ad7acbfa8886b82832b6b9cf492aff64ad60a

    SHA512

    3c793e277cdadb6341eab9b1a09f831ed4e21aa759972c32374743617130a238312dd8dc7114e24ce40b900fed120486b633f37711530ff85fe5477dd18ac369

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\A8DU897P\8ZCC3UWC.htm
    Filesize

    175KB

    MD5

    7c84a69bdf54578953e00f6c4ca43d7c

    SHA1

    cc2fe6b596ccab0a9f0e079e8f986ab756cb2726

    SHA256

    8d16091f469b36b575131781454b275ef1389e3ad0a467ef4067c360322c4409

    SHA512

    219f6577aef53762adf660bc83558af6dd3a1e97e60ff1b5ac25c7cd4beeb128c8235fff6619123fd7a0fad83e24909bee7b1107ec4bd0f2a49ce01e6e866fa6

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\A8DU897P\search[5].htm
    Filesize

    25B

    MD5

    8ba61a16b71609a08bfa35bc213fce49

    SHA1

    8374dddcc6b2ede14b0ea00a5870a11b57ced33f

    SHA256

    6aa63394c1f5e705b1e89c55ff19eed71957e735c3831a845ff62f74824e13f1

    SHA512

    5855f5b2a78877f7a27ff92eaaa900d81d02486e6e2ea81d80b6f6cf1fe254350444980017e00cdeecdd3c67b86e7acc90cd2d77f06210bdd1d7b1a71d262df1

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R3JK00ZJ\search[4].htm
    Filesize

    122KB

    MD5

    1e521e9059461aa1912e43568397f813

    SHA1

    6bec296ee8383857ad7b31c94a8dcafd63f68bc8

    SHA256

    bfbc456b1e0cac2fa4591663c2d1688119450749042aaade5869e3168c08c412

    SHA512

    24c148e6bfee2d797a79ee7e2611dddda5f5afc5bdfdd6ec242bc2133b5e79db04de3619a2415d55189fad8863733890bf5d7c0e54d9dbb02e3a6ecd71fc13e4

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R3JK00ZJ\search[7].htm
    Filesize

    181KB

    MD5

    ab0ce955aac5d7a5461307ca9f96738d

    SHA1

    d745ce65d5289bfb61e516640adcac2f0953cf9a

    SHA256

    065a179a91e08caddb4a02857f428d3f22a4d0e2cf0cd0587e44433a718593c0

    SHA512

    2258ea0c66fa3fbed718251c4cd4bb0b275387b72baa5d0369cc899c0f5445d505f6d476bcd7d28a215938e6ee14958e8986a4c37bee47eb2889bdd78169a337

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z5LT06Y3\results[3].htm
    Filesize

    1KB

    MD5

    ee4aed56584bf64c08683064e422b722

    SHA1

    45e5ba33f57c6848e84b66e7e856a6b60af6c4a8

    SHA256

    a4e6ba8c1fe3df423e6f17fcbeeaa7e90e2bd2fffe8f98ff4b3e6ed970e32c61

    SHA512

    058f023cb934a00c8f1c689001438c9bdd067d923ddcbe7a951f54d3ca82218803e0e81fbc9af5c56375ff7961deed0359af1ffa7335d41379ee97d01a76ded6

  • C:\Users\Admin\AppData\Local\Temp\Cab356C.tmp
    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar357F.tmp
    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\tmp2BB4.tmp
    Filesize

    29KB

    MD5

    65f4fbba10df645efba1eeb8b4f10ccb

    SHA1

    47466c74c3132c8e622b3da53d44585bb5d53b76

    SHA256

    b40453bffae9c371d8987d2e4012b93de2b2bb344c7c7f647ec9e110d649f01b

    SHA512

    8a0fa562c30c87c04ab29b2a3b5507ed5703a40459ab97978999616bb541bcbcfd4e7285c08d91062e89aca49cd9e11ffe9fa84c9729f5cb3a9609af89c43d3f

  • C:\Users\Admin\AppData\Local\Temp\zincite.log
    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • C:\Users\Admin\AppData\Local\Temp\zincite.log
    Filesize

    352B

    MD5

    5f3d8822ff8fc523530e3709e76186e4

    SHA1

    3f798fd8420d167e2854815a1c9c915c8f9c6395

    SHA256

    6e517047ec3c6fce1cfbe092ddc545b2d49aafffd27278ff43f5e9114dab30a6

    SHA512

    94fb0f4407f2336876c58cb55950302b89a485bcb9d8cbfac0b0e9a0c73a2348e8a22ce26424bc33a22facf98df84ce79c68c0baefcb01ce9cf16d2da86bb086

  • C:\Users\Admin\AppData\Local\Temp\zincite.log
    Filesize

    352B

    MD5

    a3faae4063956a8d0a35e417da610117

    SHA1

    47af46f3bc4025aa2538687f93c671a2f83ddefd

    SHA256

    1dcb9e1742477c6b01e93b73859006b33260a9ff3846f96683b7b68bb4ea129d

    SHA512

    4758dbbec58c7a4d4ea7501197da4f2d24eab342f21bc9335744acdc3dbd8d044848260ada19682da11a77b2bb7f75bbc881411813a41362f3f5403a7e39fa68

  • C:\Users\Admin\AppData\Local\Temp\zincite.log
    Filesize

    352B

    MD5

    b8aaf59035f2ff6609cffc86096ebb0d

    SHA1

    2b27499e4fb48965041d25738026476a85c9f9dc

    SHA256

    133d81cdbb359a2c17b4bec62bb57ede81b4753850f00ef5a2d40efd0c113c67

    SHA512

    9de69b1719e457f724138b8f6042123673cd626a41d90e6c960de283783271331503e26fd1de2b3d0a4f1b57d467b121b99e961aed13626a770e8e52725d4f00

  • C:\Windows\services.exe
    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • memory/2860-17-0x0000000000500000-0x0000000000510200-memory.dmp
    Filesize

    64KB

  • memory/2860-56-0x0000000000500000-0x0000000000510200-memory.dmp
    Filesize

    64KB

  • memory/2860-35-0x0000000000500000-0x0000000000510200-memory.dmp
    Filesize

    64KB

  • memory/2860-58-0x0000000000500000-0x0000000000510200-memory.dmp
    Filesize

    64KB

  • memory/2860-30-0x0000000000500000-0x0000000000510200-memory.dmp
    Filesize

    64KB

  • memory/2860-63-0x0000000000500000-0x0000000000510200-memory.dmp
    Filesize

    64KB

  • memory/2860-0-0x0000000000500000-0x0000000000510200-memory.dmp
    Filesize

    64KB

  • memory/2860-218-0x0000000000500000-0x0000000000510200-memory.dmp
    Filesize

    64KB

  • memory/2860-70-0x0000000000500000-0x0000000000510200-memory.dmp
    Filesize

    64KB

  • memory/2860-24-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/2860-417-0x0000000000500000-0x0000000000510200-memory.dmp
    Filesize

    64KB

  • memory/2860-10-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/2860-472-0x0000000000500000-0x0000000000510200-memory.dmp
    Filesize

    64KB

  • memory/2860-4-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/3016-64-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/3016-76-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/3016-71-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/3016-219-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/3016-69-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/3016-59-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/3016-57-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/3016-36-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/3016-31-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/3016-29-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/3016-23-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/3016-421-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/3016-18-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/3016-11-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB

  • memory/3016-473-0x0000000000400000-0x0000000000408000-memory.dmp
    Filesize

    32KB