Analysis

  • max time kernel
    92s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/05/2024, 05:57

General

  • Target

    90a11fc5a302ef5208086fae19cfb010_NeikiAnalytics.exe

  • Size

    949KB

  • MD5

    90a11fc5a302ef5208086fae19cfb010

  • SHA1

    93e9b0caee896cc3af3f2c0b24b6b7e9f1642115

  • SHA256

    8ee7da023373bb72607fd6887f937f3e10e67f342b1c75a31f9bccb152e08878

  • SHA512

    c8c5da362984e3d0c258226ac669862ddba150a4eaaeabf63c61fc194ba2e3b4a59485c2cfa099e01c4ad915602cee45afb259f9829558de76766cae91f48ad4

  • SSDEEP

    24576:UhXgV6+BDQTYfCsSwuuxQVqIi2lObXobHAEW9INFJY0au:UhXL+BlC/wjQw7x03jY0a

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\90a11fc5a302ef5208086fae19cfb010_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\90a11fc5a302ef5208086fae19cfb010_NeikiAnalytics.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    PID:3016
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    PID:3740

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\System32\alg.exe

    Filesize

    661KB

    MD5

    c5cfadac6532a0375c4a2d96123730c0

    SHA1

    1b5bddd7ffa983344b2af6838ac948bfd8b795d5

    SHA256

    7766a2b95ef083847a88fcfcfb978aca168705a192b5784e44b2ba8c785b5b78

    SHA512

    b7c670a74d889488e80596bfabc7270e9cc69a8eea9bdcb08bcbb33f5e1ced24ee7d6f043b7d7c0e8948e10478b8ed599b8ff5ea539309bc72d8c330197c1534

  • memory/3016-6-0x0000000140000000-0x00000001400F6000-memory.dmp

    Filesize

    984KB

  • memory/3016-9-0x0000000002090000-0x00000000020F0000-memory.dmp

    Filesize

    384KB

  • memory/3016-1-0x0000000002090000-0x00000000020F0000-memory.dmp

    Filesize

    384KB

  • memory/3016-12-0x0000000002090000-0x00000000020F0000-memory.dmp

    Filesize

    384KB

  • memory/3016-14-0x0000000140000000-0x00000001400F6000-memory.dmp

    Filesize

    984KB

  • memory/3740-16-0x0000000140000000-0x00000001400AA000-memory.dmp

    Filesize

    680KB

  • memory/3740-17-0x0000000140000000-0x00000001400AA000-memory.dmp

    Filesize

    680KB