Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/05/2024, 14:19

General

  • Target

    ca397037e6d2df6f398d388d524b3100_NeikiAnalytics.exe

  • Size

    529KB

  • MD5

    ca397037e6d2df6f398d388d524b3100

  • SHA1

    9e632c01e4e33bf229de71c7633fbff1ba4d9736

  • SHA256

    1d33540c6650095df1ad66291f0f0ccb502ae41cc465fd3aae618723aca1f215

  • SHA512

    052c30be4c5745f1ec2227f57e626bc2d204872f6744b19c23cd817f60b9299f2acb0aca9aed035a5ba815220aa49dbb2fd30a2023ae5882b32296b5f3f84a77

  • SSDEEP

    6144:WwynAtMrOVRkidy9yIGWlUiWxAIDWnx4vK:WwKfOVRo9yRYoeGi

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 51 IoCs
  • Drops file in Windows directory 64 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ca397037e6d2df6f398d388d524b3100_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\ca397037e6d2df6f398d388d524b3100_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    PID:1280

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\RCX5BDB.tmp

    Filesize

    531KB

    MD5

    2a5bb7512a4a7f3ea439a2ca047b0f3a

    SHA1

    3428f85c237034db4d4d1d43ee4a6b38bbfbdf58

    SHA256

    a9e0e9fa7b977fb8560083e1bdc8e429e200fc74c40e8f1541367991b3ab5ea5

    SHA512

    67b96f661d2ccb39bde35bd92cd434aa41ac8ccd1766b5af21d8828c6c329f33ef5924371ee782fef8c0ef76aae9310b228cbc5cb56708daee4735e971649071

  • C:\Program Files (x86)\Common Files\Microsoft Shared\VC\RCX35A9.tmp

    Filesize

    531KB

    MD5

    37a9c035b5419fc17b081be1b8fb1749

    SHA1

    cbb3bdb4a357696cb17705a508fb83358cb3df2c

    SHA256

    58412ad4c2861665215349c14a1d9beb67709de23d77a34dce7fa1e8e81b217a

    SHA512

    53c3e86c959361f1f164c2d2587557c0910ca1f350ce0e512c3bce2abfd0f3c103c8f6216844a66f379d7b13a7821ac1ab317f56b15b1d15155de3dc7c1dddb4

  • C:\Program Files (x86)\Internet Explorer\en-US\Explorerieinstal.exe

    Filesize

    529KB

    MD5

    ca397037e6d2df6f398d388d524b3100

    SHA1

    9e632c01e4e33bf229de71c7633fbff1ba4d9736

    SHA256

    1d33540c6650095df1ad66291f0f0ccb502ae41cc465fd3aae618723aca1f215

    SHA512

    052c30be4c5745f1ec2227f57e626bc2d204872f6744b19c23cd817f60b9299f2acb0aca9aed035a5ba815220aa49dbb2fd30a2023ae5882b32296b5f3f84a77

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\79ZXHV21\getfile[2].htm

    Filesize

    42KB

    MD5

    e5a9aad4fe457cf504ba102242492084

    SHA1

    e5d078bc24d899e935d95bf0f285882f12ede3e1

    SHA256

    672979c9d1a75a00941db1169d1b9fb45ea0fe935eb63bc1643e701c8d9ee65d

    SHA512

    be10a799e8c3be1db867f91ae052ccd7d1f3c85cd75801e70fe88a1baee56fc1f7ffac5422c2a127c3449f3b1b4e672ec7f70bd87e8d7eb7d9912f58633b1440