Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/05/2024, 01:59

General

  • Target

    5a2273a7637a9970206c0af15855fdc0_NeikiAnalytics.exe

  • Size

    2.7MB

  • MD5

    5a2273a7637a9970206c0af15855fdc0

  • SHA1

    aea87218170e73fc8143c66e7e96a7835e8f0958

  • SHA256

    0774c8d61c7b6ac3545c1f6b38b6f7bc6b917526c9727d17374793ed3dd38ead

  • SHA512

    09eb6eb092c857ae4b4dfc1d214e55922bfb41bcbb4e7c32d709980b156e2ca7827debfd4f30461fa146421032ee41c36d76dc8c17323b4cc514db2ed76f6db7

  • SSDEEP

    49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBD9w4Sx:+R0pI/IQlUoMPdmpSpL4

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5a2273a7637a9970206c0af15855fdc0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\5a2273a7637a9970206c0af15855fdc0_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3920
    • C:\FilesDO\devdobsys.exe
      C:\FilesDO\devdobsys.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:1628

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\FilesDO\devdobsys.exe

          Filesize

          2.7MB

          MD5

          2eb3b6aaa64f9c7ce421e09563c5c0da

          SHA1

          61ea6745ea4d7d53080af1f72bd019cc65e8d7cf

          SHA256

          442486a66f5a49a781e8fb84117f69116cab0f1f66338afc56d8dbfacaa19863

          SHA512

          2f6ecb43714f6613749c2944dbd70bb035f098a654e9e79f1c666fbfd3ac0e17efd309c52134ee293ef800ffc0926fa72628d3b045bdd741ff8dc3521ceac8a8

        • C:\GalaxR7\dobasys.exe

          Filesize

          582KB

          MD5

          3cf312a19873158175b8d948d4e91e40

          SHA1

          ab7154ea55d34109d2167d76bd7a997298f8f2d2

          SHA256

          672c017982d4d4616c824c6bbd3a0631dc8013986d279d10eb166adc179103e6

          SHA512

          9bd5195eeba932cdc0231ec54857f45bc125b7a6e2813e2dd7a4d53c6b9b9adeed2ecf4fa3db9b4d247ca2c4ae7e554593921e722ecc52410fb920b114b8f951

        • C:\GalaxR7\dobasys.exe

          Filesize

          2.7MB

          MD5

          b4b52812d84e36322674d8d917fde63a

          SHA1

          a218c4ff4a2a460062004860ce041e36bb027906

          SHA256

          2fc84ac218cc1bd742604f520a5595b7ee0e9cb9be5caaf3251b9ac973f01e59

          SHA512

          537a58f7293afeb3dff2e09a032314d43a0162b398cd72ea88ee1ab502943be31e1f9204346a6dff558adeb8dec12dd2121c8eaea84dfe6a1efd24f3006ab775

        • C:\Users\Admin\253086396416_10.0_Admin.ini

          Filesize

          203B

          MD5

          ab14f331e1cdcc4cf0ee171b46c45a98

          SHA1

          987bec2ffc33e1bb90c56ade78ad4d7f54ae22f0

          SHA256

          59c3f7b51f6b016b68b761df05b54db134645a461e36f6321015e33044ac5a68

          SHA512

          14424fe95a7cfdda950d432a00eaa2882e2b67851c292afc304ea7a8d6e2856c944ee018fa607cfcac27e89a6c37613e7a6aafe84a5f770afb9ec1cae0f3f6ed