Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    14-05-2024 17:47

General

  • Target

    035fb44e2df86e483516707a2e99efa0_NeikiAnalytics.exe

  • Size

    83KB

  • MD5

    035fb44e2df86e483516707a2e99efa0

  • SHA1

    5c5b9b8a42f021bfa8778c838d07723c4f27376f

  • SHA256

    8a3c8e26f3d4b428ef28a5ee33efbcc54bdf29d763f841146f6ace0e0ea8280f

  • SHA512

    ec28ae05cfa16a09cb6938125c2f37ba9af75cf48004f42a42249424ea9fc127e93e1d137b08e8090d3c0061fd326bea16227920be7a04104313dd9933884592

  • SSDEEP

    1536:YAowfUJFgjT284U+w2EwRz6OlvaeEpIaCtwUaSvcmGCCCCCHCChCHCCCdg1WCCCJ:YAowyFgjTiUkEwt6OlvaeEpIaCtwUaSa

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\035fb44e2df86e483516707a2e99efa0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\035fb44e2df86e483516707a2e99efa0_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1704
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Drops file in Windows directory
      PID:2604

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    83KB

    MD5

    c4b47b3754446be0884910cbffb380c2

    SHA1

    0ff3417f8bb96495ad182246157084fe46ad7387

    SHA256

    d677917364c508b2b9b8c6184c1a2352d882945ea0d85d0407673ecb18f59ef7

    SHA512

    d67c54625068f576f3247834f2ef0eef5e801e43d6f52bb0bdd0ba1561b7c40cfdfa47bf9209eb1d10a3e327e72578ddea222cba052c1fffcba360361290b4d8

  • memory/1704-0-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/1704-3-0x0000000000220000-0x0000000000230000-memory.dmp

    Filesize

    64KB

  • memory/2604-9-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB