Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-05-2024 20:15

General

  • Target

    68d493c15ae1e42d243c4fe32375f1a0_NeikiAnalytics.exe

  • Size

    416KB

  • MD5

    68d493c15ae1e42d243c4fe32375f1a0

  • SHA1

    96bfecd180227d656fda7662ac26d70c8b83262f

  • SHA256

    5aa5b3c412c9fc91421c07778e1574e552fa078440d7b12df2485ab296c1d76f

  • SHA512

    42ef0e653395324b2b478b3bec19a22df19ae33d04a84146d18d4ccc0c4353d1295c2c121be9124f0d651e5c178974678af2b73e34932a41ba0a6b937c1a8170

  • SSDEEP

    6144:4jlYKRF/LReWAsUy+G4QC2DhEk/5jMVkzi6lomua:4jauDReWg2DhEkBji4Ya

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\68d493c15ae1e42d243c4fe32375f1a0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\68d493c15ae1e42d243c4fe32375f1a0_NeikiAnalytics.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4292
    • C:\ProgramData\fjqdlp.exe
      "C:\ProgramData\fjqdlp.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:2648

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Documents and Settings .exe

    Filesize

    416KB

    MD5

    82ad6c68b47ea8f811618616a3e031ab

    SHA1

    a741682a80cfbfee71c47f520ba6a9d602b8d7ae

    SHA256

    e41ac8e0c76a31566d85725a61d959ca51e399d6eb714399405ab7c0f13adb1f

    SHA512

    7e010bb87c264876f0bcdc443c85733c16874587c8779f2bd883d9538921904726dda8999f275347c35639ab05f31a1ebcf302fa200dc924bd03db1052d12160

  • C:\ProgramData\Saaaalamm\Mira.h

    Filesize

    136KB

    MD5

    cb4c442a26bb46671c638c794bf535af

    SHA1

    8a742d0b372f2ddd2d1fdf688c3c4ac7f9272abf

    SHA256

    f8d2c17bdf34ccfb58070ac8b131a8d95055340101a329f9a7212ac5240d0c25

    SHA512

    074a31e8da403c0a718f93cbca50574d8b658921193db0e6e20eacd232379286f14a3698cd443dc740d324ad19d74934ae001a7ad64b88897d8afefbc9a3d4e3

  • C:\ProgramData\fjqdlp.exe

    Filesize

    279KB

    MD5

    a159a0e7e68320beb9f0c0174e96e259

    SHA1

    b23e46733b611c035a7b05b27c73ecf428870fde

    SHA256

    cb346ffee585d476a6c53c92bdd64a4aaa712941047ddf6a84ce78d2c21d7bbc

    SHA512

    aff6f080e11138d2ecd3b49dd0c55a61ef6d8c9df0bc912a76880f5ce5a2110caf47c4232dee1df472a4eaf4ee3861dc9408b80b9c6f234dfc66de0e58a0673a

  • memory/2648-130-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB

  • memory/4292-0-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/4292-1-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/4292-8-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB