Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16/05/2024, 04:37

General

  • Target

    99ee7f08f16d09034d55dddeb0a447a0_NeikiAnalytics.exe

  • Size

    33KB

  • MD5

    99ee7f08f16d09034d55dddeb0a447a0

  • SHA1

    faf6e158f48d49b84f8daccc936beac767269d13

  • SHA256

    b8118b4dac3f4fbbdd9096496b4481b1f4d6649b465a00c9d0b6f2074d69dda0

  • SHA512

    e4764ce1cd6decab9477c6e863b35327657f1188b354a240cb7d4ebf0d8c4eca05aa3bf8f779a3c9d8f4411b81dc98beb2c37979d03ddf98b99328e96b01d562

  • SSDEEP

    768:/qPJtHA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhl:/qnA6C1VqaqhtgVRNToV7TtRu8rM0wYF

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\99ee7f08f16d09034d55dddeb0a447a0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\99ee7f08f16d09034d55dddeb0a447a0_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:1500

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\microsofthelp.exe

          Filesize

          33KB

          MD5

          a2747f676a454a1362585dd2704a94a6

          SHA1

          33159b472c93c38dc565991073b493b699d8ade6

          SHA256

          584324ce47f8abf235bea2cfa2a5dfaa261ec1fbffa2cda0f556911ba0732976

          SHA512

          89f31c63c299223cd6a5c7383f4e53a01023373d8bec69067e267d6536915b14221912e317858331da01f74376fefd29815869123aaf60032675999a1e34ffca

        • memory/2212-0-0x0000000000400000-0x0000000000403000-memory.dmp

          Filesize

          12KB

        • memory/2212-3-0x00000000002A0000-0x00000000002A3000-memory.dmp

          Filesize

          12KB

        • memory/2212-7-0x0000000000400000-0x0000000000403000-memory.dmp

          Filesize

          12KB