Analysis

  • max time kernel
    149s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09/05/2024, 19:06

General

  • Target

    ceebec2b90dfd315fce88ceb46d4fe30_NeikiAnalytics.exe

  • Size

    24KB

  • MD5

    ceebec2b90dfd315fce88ceb46d4fe30

  • SHA1

    98ec0c7e5b660ca459830d0e3fc1edd92f1dc8d5

  • SHA256

    a84d7b952f9f5fec097ae727b9867b7c2796d021dfd2e4a06ecc3b89c792851d

  • SHA512

    e8dc08dc9507b702858bafebdc26bed047030be1a3c62b12cf23820c03ca28fe60c3e526dd60ec0e7f2ea6cdcd7e8bcbf169ebb36800d9bbf2e6c79897e27f59

  • SSDEEP

    384:TPHWv6AMlEDPOEo6YpOELjggggggLvggggggggUaocCU+IF:TmvHfYggggggLvggggggggUaocN+IF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ceebec2b90dfd315fce88ceb46d4fe30_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\ceebec2b90dfd315fce88ceb46d4fe30_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2156
    • C:\Users\Admin\AppData\Local\Temp\btkba.exe
      "C:\Users\Admin\AppData\Local\Temp\btkba.exe"
      2⤵
      • Executes dropped EXE
      PID:1200

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\btkba.exe

          Filesize

          24KB

          MD5

          f81ea200dd4a27cb109ffd48a75fd38f

          SHA1

          c585c5e626ff4a5ac7ee9eda36b2a727dbe6b195

          SHA256

          ae1aaff8b09d104478671967c50d574052c2bb0c296ed40b8e2b949a441c26fe

          SHA512

          b801267deb28a1b2a157a8bb9ce38fa82aabae1489f6913c347b0660fc1b8671fa5fe711656617d958ee31440f9e16ac3e557de69a9476764702f59d5c55a39c

        • memory/1200-11-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/2156-0-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/2156-2-0x0000000000401000-0x0000000000402000-memory.dmp

          Filesize

          4KB

        • memory/2156-9-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB