Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    10-05-2024 02:43

General

  • Target

    5121870bfc3d8eea5e307fed21f15570_NeikiAnalytics.exe

  • Size

    262KB

  • MD5

    5121870bfc3d8eea5e307fed21f15570

  • SHA1

    14a8835dfa22c005cd211ebf0f62458b2e9769b0

  • SHA256

    dead789596c95f57499e9da1fa130cbaf453a32e4c2368e72eee6e7fcdfad330

  • SHA512

    b0caa0265b9fc4f91c08bbf3c1132df65fe688063b5213501676efe9cae02f6d7d4ae375dc835020b5f15fe66c21c027ec9c7f3cd33b2660391642a678c58e63

  • SSDEEP

    6144:hjbl4aIa288oHDWIQAxPVgE8DKyBbPiP+:NmaIaRjDtF6xbKP+

Score
8/10

Malware Config

Signatures

  • Modifies AppInit DLL entries 2 TTPs
  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5121870bfc3d8eea5e307fed21f15570_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\5121870bfc3d8eea5e307fed21f15570_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of UnmapMainImage
    PID:568
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {69D3C8A3-47B2-4C8A-85EC-F56347CAA19D} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2148
    • C:\PROGRA~3\Mozilla\eccstpf.exe
      C:\PROGRA~3\Mozilla\eccstpf.exe -ufgsyxd
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of UnmapMainImage
      PID:2712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~3\Mozilla\eccstpf.exe

    Filesize

    262KB

    MD5

    b3df9f28b9a8d3bd49ef1dcb88e647a9

    SHA1

    76b3b624b4e7fb14e928159b0d27ea196844798c

    SHA256

    8573dd7f57debd39e494b73870d8e27d4765dc09c7ad1d73e3c7bc247995ac32

    SHA512

    6494b91c4b6462c1cc57cbaa001eff1c4d8442e24a2766ab16df19e0ce003afd411f18fad4df7b06f4d4903ef0abaa738ee4144fae9439add985971f759dca64

  • memory/568-0-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/568-2-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/568-1-0x0000000000260000-0x00000000002BB000-memory.dmp

    Filesize

    364KB

  • memory/568-4-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/2712-7-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2712-8-0x00000000003A0000-0x00000000003FB000-memory.dmp

    Filesize

    364KB

  • memory/2712-9-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB

  • memory/2712-11-0x0000000000400000-0x000000000045B000-memory.dmp

    Filesize

    364KB