Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/05/2024, 17:11

General

  • Target

    a0eeab4f971b5c5ccb237efa58fa3010_NeikiAnalytics.exe

  • Size

    480KB

  • MD5

    a0eeab4f971b5c5ccb237efa58fa3010

  • SHA1

    fe7c55d749a05e1a97b556602fb64e07821e2903

  • SHA256

    f7c5a1342c48ba63b7a5a75c84d18845bfe12eb6c3c28a94c454d98aa43baa73

  • SHA512

    e176086484d5ab377c09a636b3d5a758a361d537a718d3432e31a693423be63d93d9b2be92a3a4cdf8ae95b11357ceffe1996a685992bea386d3e78cbdce7f5b

  • SSDEEP

    6144:pjFRiOcXH6XWD0w1tizmtnktLJ6znvxNcCI+1jDIlnJ9+1aTEPTnOK4JKElDnC:nRDc3yWDNU+YUznzNjElWaT07NQtDC

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 4 IoCs
  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 13 IoCs
  • Modifies registry class 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a0eeab4f971b5c5ccb237efa58fa3010_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\a0eeab4f971b5c5ccb237efa58fa3010_NeikiAnalytics.exe"
    1⤵
    • Modifies firewall policy service
    • Adds policy Run key to start application
    • Sets service image path in registry
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    PID:4512

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\msrpc.exe

    Filesize

    480KB

    MD5

    885c89a10fff826a44065285272e2e6a

    SHA1

    0acfa7c40701593fe448a19f9b7e55f881e87b99

    SHA256

    6e9ada04cfea6a714c040703a1dee99ce30ebac6fe7957b3893d8c7a44be58ba

    SHA512

    5ef950803ca0f3010263f28e2b2ccd42fc52a781bcbb587ce9d4e69638c142f2abcce5b575e086d057779267ef6ec82dc74666b6d359b53f06bdf1a8f1a61ac2

  • memory/4512-21-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB

  • memory/4512-3-0x0000000000770000-0x0000000000771000-memory.dmp

    Filesize

    4KB

  • memory/4512-1-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB

  • memory/4512-19-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB

  • memory/4512-20-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB

  • memory/4512-0-0x0000000000770000-0x0000000000771000-memory.dmp

    Filesize

    4KB

  • memory/4512-22-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB

  • memory/4512-23-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB

  • memory/4512-24-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB

  • memory/4512-25-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB

  • memory/4512-26-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB

  • memory/4512-27-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB