Analysis

  • max time kernel
    149s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10-05-2024 18:21

General

  • Target

    401ef391d5db9fad35ccf4becf3ad910_NeikiAnalytics.exe

  • Size

    35KB

  • MD5

    401ef391d5db9fad35ccf4becf3ad910

  • SHA1

    92b810f62979ad34e145a8d1e0caa5aabb66f795

  • SHA256

    d95934877d3aed35deef4b78b675d898c4e872dc6b2ace86514f6022325ae89f

  • SHA512

    d78d94652e1718f7c8ff38607fbc13fdaedcf3fcfe0470edd3f47d1f9c1a925a4989136b8557bb29d37e93de45b7ebdaafd2334884e2af6dd9e18945ca1b2d83

  • SSDEEP

    768:/qPJtHA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNh/:/qnA6C1VqaqhtgVRNToV7TtRu8rM0wYf

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\401ef391d5db9fad35ccf4becf3ad910_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\401ef391d5db9fad35ccf4becf3ad910_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1932
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2200

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    35KB

    MD5

    5e0cbb7507a6fa8a7ea4e89966bd6d4b

    SHA1

    91c172fa31a4be04439ff4916c7c777ebde36e23

    SHA256

    592744131cae168e5a9ce5ace6cdd678997127bc81aefebeb342c1abe0b50b53

    SHA512

    f50a5ff779540f9522bcbbb4dacf28fee081fb683e9c0e6e9a197efce349987bb84248aede1ff48a9733f168d40ccf7187e95e3484c40ada5909936ec288f18d

  • memory/1932-0-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/1932-6-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB