Analysis

  • max time kernel
    118s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    11-05-2024 10:58

General

  • Target

    aecf900ddc27447dfa84dcc3042131f0_NeikiAnalytics.exe

  • Size

    46KB

  • MD5

    aecf900ddc27447dfa84dcc3042131f0

  • SHA1

    983fc5ce8ff7ab5ae678a0756ab3abc80e9c4009

  • SHA256

    9f3bdc1c53f2fb75e4357521bbd24b9dbdcfe92691b30cf211712f35ee639310

  • SHA512

    c736f060ccb9ddca1145b10dbaebc8837c99d25cfe625bccd43119c540dc89ecc1e752ceeb24a7ab1c61619a9961d2323975040b1f5e1c8ad729e8519bd0d456

  • SSDEEP

    384:fpXhwnhBCTnvlHI68swU1Mf94tynhs36o7dEiXF13K1sD+8XtBhyG+dOFAFM7Z:fpXhwnrCTnd8swmTWW3PksDnjP7Z

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aecf900ddc27447dfa84dcc3042131f0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\aecf900ddc27447dfa84dcc3042131f0_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Users\Admin\AppData\Local\Temp\gwkgt.exe
      "C:\Users\Admin\AppData\Local\Temp\gwkgt.exe"
      2⤵
      • Executes dropped EXE
      PID:1984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\gwkgt.exe

    Filesize

    46KB

    MD5

    771aac842b2790c6f6a82d086d491c30

    SHA1

    929f4e4f120fce792d76fbc54254c068ac703438

    SHA256

    99e091e574b1f86a49cd6801ee194230d3cd2c82327a5d0eec048e17b1eeb766

    SHA512

    6bd067b3c0b780c1289eb9ba3cc06e80eca0ef9ac5b7429052235066562cce2cf1a3ead0ccff77ac2624cce727392d1e96c4a09a2b0d27537685efbcdbfb0e34

  • memory/1740-1-0x0000000000402000-0x0000000000403000-memory.dmp

    Filesize

    4KB

  • memory/1984-8-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB