Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-05-2024 02:05

General

  • Target

    46dcc2fc391188af04b65634bdfa0b60_NeikiAnalytics.exe

  • Size

    438KB

  • MD5

    46dcc2fc391188af04b65634bdfa0b60

  • SHA1

    d945fa119f41c2e33c3792319eb61d79c12bb7b6

  • SHA256

    fd397e099239c8637047d721f1eb843cf0a9742693a70120126dfee0795f7c68

  • SHA512

    8b29d95bd6b14e2bca269b89f8e7720938fe8d2b7629994ce8e7299f3b9f993925100c80d0890ba704284fbeebfffc82543aa562f06bdfa6715ced9fa5a67f14

  • SSDEEP

    6144:LdspDeDrxkg/vrMuJIgwhEFHyOrJcX/Pgqwzm5IzkWjS4e4azExBKO1t4Kb70Nqx:J8kxNhOZElO5kkWjhD4AF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 17 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 2 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\46dcc2fc391188af04b65634bdfa0b60_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\46dcc2fc391188af04b65634bdfa0b60_NeikiAnalytics.exe"
    1⤵
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4748
    • C:\Program Files (x86)\FFGW.EXE
      "C:\Program Files (x86)\FFGW.EXE"
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      PID:4260

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\FFGW.EXE

    Filesize

    438KB

    MD5

    f09acb336b084aa848fe77868c610c9b

    SHA1

    fdc112360cd689e015942a83d4246baee79f936e

    SHA256

    21d7cb48b6139963cbbe0cb1b22dd167000913ecbbc3146844675d9fd5ef2f9f

    SHA512

    55bc13311ba2d9011fa55748afe321e08eb9b6114f55b306a57f6db5b2a869e608c0d761d00e92a08f9bdb70e116286b8f678a5a63a6f4b051ca02af4155fa89

  • C:\filedebug

    Filesize

    297B

    MD5

    eb4bd939f9909bef18125bbc0fe2c5cd

    SHA1

    04cf8c0e0d30f191655ad8056c0b087a0de1114b

    SHA256

    3553136f13af4a346b02fddf2d47d63110fc8266a35e7f2279ff8e0bb9f31e3b

    SHA512

    d52036370cbd0ebd4752bca873cb70a7f98a904f14413107d05deadd07ece9e53da52d5046352b6770a92422d3bf63c960c5a0f43d802ed29473ee96e82b43bc

  • memory/4260-23-0x00000000021E0000-0x00000000021E1000-memory.dmp

    Filesize

    4KB

  • memory/4260-25-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4260-26-0x00000000021E0000-0x00000000021E1000-memory.dmp

    Filesize

    4KB

  • memory/4748-0-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB

  • memory/4748-1-0x00000000021C0000-0x00000000021C1000-memory.dmp

    Filesize

    4KB

  • memory/4748-24-0x0000000000400000-0x000000000046E000-memory.dmp

    Filesize

    440KB