Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    09/05/2024, 23:09

General

  • Target

    1a63035ac44beb5a1b7ad76331434a70_NeikiAnalytics.exe

  • Size

    52KB

  • MD5

    1a63035ac44beb5a1b7ad76331434a70

  • SHA1

    25670a05e8d7c53e10d2c545030dae17ef09c496

  • SHA256

    6462172b22198b1b809ee9d2605ed2ff92e1533123795ed1e4b1e049fb7df360

  • SHA512

    0930ca88ab74054c9262ec11796701b9f771bc0770223ac0263e410eb820550586ba80bb784a2afc64de7a27e28f132fd90afc4fda8d265129be7b390fffeac8

  • SSDEEP

    768:2PitRNEGtXXnZ/JudBDtcUtdVCxVOS3fNGqSatlATuL:RF3wDtkx3PR/

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a63035ac44beb5a1b7ad76331434a70_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\1a63035ac44beb5a1b7ad76331434a70_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:308
    • C:\Users\Admin\AppData\Local\Temp\hcbnaf.exe
      "C:\Users\Admin\AppData\Local\Temp\hcbnaf.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:2812

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\hcbnaf.exe

          Filesize

          53KB

          MD5

          7a73cb82c5c296568e72c19122b07f3f

          SHA1

          6ea52dde865d282e1eb16a56bc864655ec2461ea

          SHA256

          5b06788c888e29641ba6b1b92e7b4e2797ad98fd59888c9840593a9c8a060f4e

          SHA512

          18970decfe05f83c4132e9c634f3e022876c7277766ecdfa7f1b806721cb0caf7044bf45eee7958c778a102930a94178a106620f55620225bc53a5851c1d8bc4

        • memory/308-1-0x0000000000350000-0x0000000000F58378-memory.dmp

          Filesize

          12.0MB