Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 17:13
Static task
static1
Behavioral task
behavioral1
Sample
a1d2b905115a6a80dc29130c6787f7f0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a1d2b905115a6a80dc29130c6787f7f0_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
a1d2b905115a6a80dc29130c6787f7f0_NeikiAnalytics.exe
-
Size
31KB
-
MD5
a1d2b905115a6a80dc29130c6787f7f0
-
SHA1
175d957fcff82068179460507dde1b19db0ae7f0
-
SHA256
3eaf55643e02cdd31c00d7139c8a647ea29d18dfdd0e0fa3ad866b06f87a4440
-
SHA512
0ff2c9e0e9048ce217520a09afcfeb0d7630c0bf4fe0dee3dd1b3e5972d871f2cbb63fbb7ad3f63ece32cb7e5fc582fc808ce4ea4873b9b7f0fa2875e2d11a82
-
SSDEEP
768:/qPJtHA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhP:/qnA6C1VqaqhtgVRNToV7TtRu8rM0wYv
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1980 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 1980 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" a1d2b905115a6a80dc29130c6787f7f0_NeikiAnalytics.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe a1d2b905115a6a80dc29130c6787f7f0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2428 wrote to memory of 1980 2428 a1d2b905115a6a80dc29130c6787f7f0_NeikiAnalytics.exe 90 PID 2428 wrote to memory of 1980 2428 a1d2b905115a6a80dc29130c6787f7f0_NeikiAnalytics.exe 90 PID 2428 wrote to memory of 1980 2428 a1d2b905115a6a80dc29130c6787f7f0_NeikiAnalytics.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1d2b905115a6a80dc29130c6787f7f0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\a1d2b905115a6a80dc29130c6787f7f0_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4076 --field-trial-handle=2280,i,11703952675008463361,17436195144517971517,262144 --variations-seed-version /prefetch:81⤵PID:4620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD533d6635b093d8958167fd9328edb704f
SHA16c1de90f065ddf9c47a88aee65c12f4a3cadcc31
SHA256a11ba56c05e362d5d7c3383b021170d08a04fc489baddfc591666e1040afedfa
SHA5128af727e319ac3f1c597439c573cb2fb6d1f769b56ad0ba344deb2bfcd967fc441faa96f65e7b9e471ecd94d1c404fc3f7840434e23f1fd6b01c105549dc84347