Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    14-05-2024 02:20

General

  • Target

    571111d0c0bbd307792b013bfb21cf30_NeikiAnalytics.exe

  • Size

    930KB

  • MD5

    571111d0c0bbd307792b013bfb21cf30

  • SHA1

    8bc36fe19ac1addbcb6dee89d12a9f77913fa5ee

  • SHA256

    6e8a95e5e4aba118617c6a0b1d053aa05d90acd6ee632e504343d074a3e33f6d

  • SHA512

    ff8bd0a167ea3abaca1e826bca2d8d0f86f7e7d920f9f845cf728650c4a1f4a147619f8681cdc5ea66938d35ad906e3dae3c80bf9b62ab662effe7dc89939d34

  • SSDEEP

    12288:b1bj6hloEYL8/EaSNKCDduALsTvevxj6/pisTbuyNKA5emv:b1bj0aEqaSNKCDduYsTV/oyzv

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\571111d0c0bbd307792b013bfb21cf30_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\571111d0c0bbd307792b013bfb21cf30_NeikiAnalytics.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:2192

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\DC++ Share\RCX318E.tmp

    Filesize

    62KB

    MD5

    b126345317624479f78fbf30b3a1fe5a

    SHA1

    655c966bf7bbf96ee49c83062d30b9dba17d693c

    SHA256

    8723d2d97d52f6d3b63968594c93bf2c5b5300b306c9670be4616cb134964301

    SHA512

    d0be6d608b5f4e482287d16e6587e00be1b4390f78efc3ce63008f99be7358e65f0eef9eba330d845462b64fa7a86cc3f1395b863ad0f8d01c0b790fc2f4c02d

  • C:\Windows\SysWOW64\xdccPrograms\7zG.exe

    Filesize

    973KB

    MD5

    5fb39e80f1c07a83269c058eb519b664

    SHA1

    cc86bfa2aeb909eb9c83ed75054e02e40faf976d

    SHA256

    0412396339b0eeb774e6240f302e7f6999d09951bca2edb0b0596a4825062974

    SHA512

    4956345086dbdff6bcb2968419a6c35915aeef42b5c37486396fde1e2b2ae5f606a19d7934d318cc84abfe5b3ef3635913c8940e582a93b5c3182b7194b5e4d5

  • memory/2192-110-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2192-111-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2192-106-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2192-107-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2192-108-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2192-109-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2192-104-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2192-105-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2192-112-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2192-113-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2192-114-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2192-115-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2192-116-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2192-117-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB