Analysis

  • max time kernel
    140s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    09/05/2024, 15:09

General

  • Target

    6d1a4720db498c88b30b2f8ef7c3f840_NeikiAnalytics.exe

  • Size

    23KB

  • MD5

    6d1a4720db498c88b30b2f8ef7c3f840

  • SHA1

    d0b06bf11fd60ac7ed1c60fba00b915e009c7887

  • SHA256

    3c5e47b0b6519fc48fdda0f3ebcf1a47844269ca67ae3af2b457295c9b771952

  • SHA512

    2ed6e2fa2d62f5c6de5149b0632d178f80f8a8015bdaadf32e54ca5e562d9ed33a5208272fbcbf926cdda401383e44249e348be6a79042719f8fba18858ef9e3

  • SSDEEP

    384:6gvlQoGKdivmICib0666666666RJ70uIabjbt3TUAKoYQW9EsHyLrJo+N:x2oGKdJ5i0uIaOUYP2rf

Score
7/10
upx

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6d1a4720db498c88b30b2f8ef7c3f840_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\6d1a4720db498c88b30b2f8ef7c3f840_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1848
    • C:\Users\Admin\AppData\Local\Temp\codecupdate.exe
      "C:\Users\Admin\AppData\Local\Temp\codecupdate.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:2144

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\codecupdate.exe

          Filesize

          24KB

          MD5

          04ee834fa99c352ae218d9de48e2f628

          SHA1

          0d674b1498a893849e065c1b10a5d6e64245979c

          SHA256

          ef1dfcc58fbc3fd68e9d631ba92b5095b0ce9abee551b18c29aec4e5c06aca6a

          SHA512

          0eb10a81ccb717d747ac66454bbd7048bc5e7b5ab31cbef3a8fb21e151cc9671e5527cf15fab3bbe2ae4ddeca96be9e7e5ed04767a22801e86684b7b7961239a

        • memory/1848-0-0x0000000000500000-0x000000000050D000-memory.dmp

          Filesize

          52KB

        • memory/1848-2-0x0000000000501000-0x0000000000502000-memory.dmp

          Filesize

          4KB

        • memory/1848-6-0x0000000000650000-0x000000000065D000-memory.dmp

          Filesize

          52KB

        • memory/1848-10-0x0000000000500000-0x000000000050D000-memory.dmp

          Filesize

          52KB

        • memory/2144-12-0x0000000000500000-0x000000000050D000-memory.dmp

          Filesize

          52KB