Analysis

  • max time kernel
    143s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-05-2024 04:02

General

  • Target

    937611d550c15e670ecfb6122d884e00_NeikiAnalytics.exe

  • Size

    79KB

  • MD5

    937611d550c15e670ecfb6122d884e00

  • SHA1

    276a6e99b9a128c852f2f5f7a0096d00ef80da9d

  • SHA256

    314f032ec40295df4ac801c4951730d3cd6e8cca4fda4a6498e08dd8ddf12cc2

  • SHA512

    8299cd7c3bf27dd7f055f8626bcb74496e6f4d081982382628646661ea56d58c1df26e9024890f2dd83748c097eae1b642de7950424a803c8ffdd49585e16c4d

  • SSDEEP

    1536:zv9bXiv/4povvaELhOQA8AkqUhMb2nuy5wgIP0CSJ+5y1B8GMGlZ5G:zv9qvCEUGdqU7uy5w9WMy1N5G

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\937611d550c15e670ecfb6122d884e00_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\937611d550c15e670ecfb6122d884e00_NeikiAnalytics.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1844
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3976 --field-trial-handle=2900,i,14549994492153927475,12895178890800740987,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4532

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\[email protected]

      Filesize

      79KB

      MD5

      c85d0d0768ce4e41330652af9a96fc5b

      SHA1

      70db0938f07325a7af0d45d6470c38a49d79a4bc

      SHA256

      00543876b03809a56d162501a0f39bf7456e424f6f11bc440ea43a487b1fb064

      SHA512

      40a9c6c2b39d0eaf0ad467e1035693e461c4ca47c88d9ca2a54b3a2fcf5997dad8f8655c1058113432006b6940fe69e6ef283ea8e0c21a097dc9e1855f9c8a61

    • memory/1844-6-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB

    • memory/4660-5-0x0000000000400000-0x000000000041B000-memory.dmp

      Filesize

      108KB