Analysis

  • max time kernel
    147s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    14/05/2024, 15:55

General

  • Target

    ccea6059e7b0134c0a33653f958f3f50_NeikiAnalytics.exe

  • Size

    42KB

  • MD5

    ccea6059e7b0134c0a33653f958f3f50

  • SHA1

    a282a3eb124ec37e1e5befdb2938011bb9a12f7b

  • SHA256

    16df5f96102a3ab820f5fa5530638886ff75439729c66fa71eea1442098e2c04

  • SHA512

    b8f8b395a459e461fcfec2021887898b8bc545b82800dc297ddc9bd1e4949df67d398c710d01f03417084f8f6d8d3097436e25f560cdb79388d3f15e6c1a8ce3

  • SSDEEP

    768:vQz7yVEhs9+js1SQtOOtEvwDpjz9+4REL+cc66T9:vj+jsMQMOtEvwDpj5HW5s9

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ccea6059e7b0134c0a33653f958f3f50_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\ccea6059e7b0134c0a33653f958f3f50_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2436
    • C:\Users\Admin\AppData\Local\Temp\misid.exe
      "C:\Users\Admin\AppData\Local\Temp\misid.exe"
      2⤵
      • Executes dropped EXE
      PID:3064

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\misid.exe

          Filesize

          42KB

          MD5

          055334d91f301e00058cf333c10623e4

          SHA1

          599fa8aa6e12df6aae1a5e25257e09de15d4bef0

          SHA256

          ceed92b2fdf30eba0dc325b80b64d5c00da8b3fb5ccbd253f9a6b4a3b265ef28

          SHA512

          ebae83a699106ec345ac9050ba016c6ad621fd18b27f85221e5f6dbac092ecf9f31f9a5d1e8c6b3b7fd124393875e7feccaa141b90fd72a942f084afc8bb35da

        • memory/2436-0-0x0000000000340000-0x0000000000346000-memory.dmp

          Filesize

          24KB

        • memory/2436-1-0x0000000000380000-0x0000000000386000-memory.dmp

          Filesize

          24KB

        • memory/2436-8-0x0000000000340000-0x0000000000346000-memory.dmp

          Filesize

          24KB

        • memory/3064-15-0x00000000002C0000-0x00000000002C6000-memory.dmp

          Filesize

          24KB

        • memory/3064-22-0x0000000000240000-0x0000000000246000-memory.dmp

          Filesize

          24KB