Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 14:03

General

  • Target

    5726570822f2e9e7dfc387a67129fa4c76876869b403342aed4021b9bd36f030_NeikiAnalytics.exe

  • Size

    2.0MB

  • MD5

    8f05e4a20d8582fb839964fb0f5cd140

  • SHA1

    bb65c78eb0ff0e0cc1463756b7a5bba754c1fb17

  • SHA256

    5726570822f2e9e7dfc387a67129fa4c76876869b403342aed4021b9bd36f030

  • SHA512

    1fc07fd0595a0538959e336d27ed14ae2ef7367721f485ab488b9b8c1c2cec1c735771db2356c876621e1e2bd8f792c41e16f35b96f47a49a520d849e640c06f

  • SSDEEP

    49152:PgyBI3cKWfAH/yalDjMoO5LGEf+CejGO9P4JbYzU7H:PgzcFfAfRlDyyO+XRz

Malware Config

Signatures

  • UPX packed file 25 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • VMProtect packed file 13 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5726570822f2e9e7dfc387a67129fa4c76876869b403342aed4021b9bd36f030_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\5726570822f2e9e7dfc387a67129fa4c76876869b403342aed4021b9bd36f030_NeikiAnalytics.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:1760

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Defense Evasion

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1760-0-0x0000000000400000-0x00000000008C0000-memory.dmp
    Filesize

    4.8MB

  • memory/1760-8-0x00000000762B0000-0x00000000762B1000-memory.dmp
    Filesize

    4KB

  • memory/1760-4-0x00000000779A0000-0x00000000779A1000-memory.dmp
    Filesize

    4KB

  • memory/1760-10-0x0000000000400000-0x00000000008C0000-memory.dmp
    Filesize

    4.8MB

  • memory/1760-2-0x00000000779A0000-0x00000000779A1000-memory.dmp
    Filesize

    4KB

  • memory/1760-15-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1760-21-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1760-37-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1760-55-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1760-62-0x0000000000400000-0x00000000008C0000-memory.dmp
    Filesize

    4.8MB

  • memory/1760-61-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1760-59-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1760-57-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1760-64-0x0000000000400000-0x00000000008C0000-memory.dmp
    Filesize

    4.8MB

  • memory/1760-65-0x0000000000400000-0x00000000008C0000-memory.dmp
    Filesize

    4.8MB

  • memory/1760-63-0x0000000000400000-0x00000000008C0000-memory.dmp
    Filesize

    4.8MB

  • memory/1760-53-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1760-51-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1760-49-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1760-47-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1760-45-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1760-43-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1760-41-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1760-39-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1760-35-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1760-33-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1760-31-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1760-29-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1760-27-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1760-25-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1760-23-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1760-20-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1760-19-0x0000000000400000-0x00000000008C0000-memory.dmp
    Filesize

    4.8MB

  • memory/1760-18-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1760-17-0x0000000010000000-0x000000001003E000-memory.dmp
    Filesize

    248KB

  • memory/1760-14-0x0000000000400000-0x00000000008C0000-memory.dmp
    Filesize

    4.8MB

  • memory/1760-12-0x0000000002810000-0x00000000029D4000-memory.dmp
    Filesize

    1.8MB

  • memory/1760-1-0x0000000000401000-0x00000000004C8000-memory.dmp
    Filesize

    796KB

  • memory/1760-82-0x0000000000400000-0x00000000008C0000-memory.dmp
    Filesize

    4.8MB

  • memory/1760-83-0x0000000000400000-0x00000000008C0000-memory.dmp
    Filesize

    4.8MB

  • memory/1760-84-0x0000000000400000-0x00000000008C0000-memory.dmp
    Filesize

    4.8MB

  • memory/1760-85-0x0000000000400000-0x00000000008C0000-memory.dmp
    Filesize

    4.8MB

  • memory/1760-86-0x0000000000400000-0x00000000008C0000-memory.dmp
    Filesize

    4.8MB