Analysis

  • max time kernel
    145s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/05/2024, 12:43

General

  • Target

    e41b7e50831acf64703413d95a25a0b0_NeikiAnalytics.exe

  • Size

    729KB

  • MD5

    e41b7e50831acf64703413d95a25a0b0

  • SHA1

    90d01b8823234fde5f3e61eb7afdf4a3da6dc310

  • SHA256

    4bf737d9c8d0feff3422f193c385e61b54fb3e984d1b20ad55b899d3a93f906e

  • SHA512

    675c98e45180e468f1432ad87a5a89684d5d41c15e764b07da1426acedbd9b39ab5d80f5d66508ffd2133d063921ea810e5aefe05a68a88c721eecb8d27fee0f

  • SSDEEP

    6144:4wynAtMrOVRkidy9yIGWlUiCIII1SLHco6FLY6shZBWlK3b++2kLDZPHQXq9iHqn:4wKfOVRo9yRYcIIGLUh7Wk/LwqZl

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 6 IoCs
  • Drops file in Program Files directory 32 IoCs
  • Drops file in Windows directory 64 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e41b7e50831acf64703413d95a25a0b0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\e41b7e50831acf64703413d95a25a0b0_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    PID:624

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\RCX620F.tmp

          Filesize

          730KB

          MD5

          99e861b62dc50f9dd0aa3e0c854e23bb

          SHA1

          47ce28611d6bb71603d434cca44e47d9972db775

          SHA256

          344f20c5179db25a0b1ec86310b1be86a561bd830fe01aba1b4be57cfcba9ebf

          SHA512

          f276293a6dc0f1b0c4280cce568160aca119377ad2a9e81f736afc365c4ab15d6f56d4e45690f13a9a3d3a523167be5003c1fc5576986888eb73a951a3bbf1ce

        • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Multimedia\MPP\AdobeAdobe19.10.20064.310990.exe

          Filesize

          729KB

          MD5

          e41b7e50831acf64703413d95a25a0b0

          SHA1

          90d01b8823234fde5f3e61eb7afdf4a3da6dc310

          SHA256

          4bf737d9c8d0feff3422f193c385e61b54fb3e984d1b20ad55b899d3a93f906e

          SHA512

          675c98e45180e468f1432ad87a5a89684d5d41c15e764b07da1426acedbd9b39ab5d80f5d66508ffd2133d063921ea810e5aefe05a68a88c721eecb8d27fee0f

        • C:\Program Files (x86)\Windows Defender\es-ES\RCX43F0.tmp

          Filesize

          730KB

          MD5

          cc557000d8c6b3821cdb3e837df93198

          SHA1

          680033c4b193c5ce9db3aee6c8ea51c2c3eeed4b

          SHA256

          078df1daea385f4669f6b16ba2e696569244ec5fdb4c85722a4a13299cf8ded5

          SHA512

          69ffb00d5e0cc3cb36f229464cc4585a7724642192eecd52df0de10383d4b00c6a5c892505fc9a8e896622c88cfb7adc4cafb2d6e416cfaccfb4bcdb51b0b803

        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WPF\PresentationHostv0400WindowsBase.exe

          Filesize

          710KB

          MD5

          2081b062c41027fe20b0c8917301f531

          SHA1

          a6901dd4315593367c61cff4d2a8c1d2c96a1092

          SHA256

          f0a071786e10615bcd7772dc83b03967934f48875189df7520dc691f2997405d

          SHA512

          da3fa1abe6248c30316234fbe80e56f348b90e06602621ff1bf11bd06d9a67ea85c551a83e8de1a514daeed6229397d5aa2206bebdfe24bc16d4633d063022c4