Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    14/05/2024, 14:51

General

  • Target

    cb2003fb62cf614ea94e614da88e6f20_NeikiAnalytics.exe

  • Size

    90KB

  • MD5

    cb2003fb62cf614ea94e614da88e6f20

  • SHA1

    cf36f562142e01c19f661090c1c381d6819f0a1d

  • SHA256

    561815bcffb204f77b1fcb7ef61f617c01f2304e9c9766f86d0b847f89cd4a59

  • SHA512

    56e6dfc6c06c8eee1ed2f7445d5d35e44ed52ddb4e2b1080f9c1f20762c67f294c77eba2829028faab1d03d7099f9a8e0c72912ea287495619caae421efa2082

  • SSDEEP

    1536:DS7nK8eztdgI2MyzNORQtOflIwoHNV2XBFV72B4lA7ZsyPibdF45jYl7JJUj23pa:DJtdgI2MyzNORQtOflIwoHNV2XBFV72J

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cb2003fb62cf614ea94e614da88e6f20_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\cb2003fb62cf614ea94e614da88e6f20_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1636
    • C:\Users\Admin\AppData\Local\Temp\ffengh.exe
      "C:\Users\Admin\AppData\Local\Temp\ffengh.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      PID:2028

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\ffengh.exe

          Filesize

          90KB

          MD5

          8c28abb094633c3a383095828e8c9a8e

          SHA1

          f89775880ebc68cd063c22d694d35839dc6dcd13

          SHA256

          24fc14556775a7d60c723f070718d9baab7cfefb2202e26d5cb42d9478e7c85a

          SHA512

          39d1d51f39649842f7b393afeacca8d3df929355e7ad0a9318b730ca9df01745db452ab7239bcd7c6029adc49154d2055099285341c40582ac09cb0ae698ca99

        • memory/1636-1-0x0000000000400000-0x0000000000404000-memory.dmp

          Filesize

          16KB

        • memory/1636-6-0x0000000000240000-0x0000000000247000-memory.dmp

          Filesize

          28KB

        • memory/1636-0-0x0000000000240000-0x0000000000247000-memory.dmp

          Filesize

          28KB

        • memory/2028-19-0x00000000001C0000-0x00000000001C7000-memory.dmp

          Filesize

          28KB