Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    16-05-2024 05:45

General

  • Target

    a7df021bfd03e579860ae38b29bd25b0_NeikiAnalytics.exe

  • Size

    83KB

  • MD5

    a7df021bfd03e579860ae38b29bd25b0

  • SHA1

    902db87225ed45b52f55820d9f75affb4ead54a4

  • SHA256

    7758d351f24a2f1a79dce166860ea6b5728455af6908af55630e39de10d92086

  • SHA512

    d6543ed2f087fb305d2555e10c2301bb58cec93aafd56000cd9ab8a2b85b830735533a4be7859d333e442b3668d00def736bb8bfd5f385708a99ec9e75b392ec

  • SSDEEP

    1536:YAowfUJFgjT284U+w2EwRz6OlvaeEpIaCtwUaSvcmGCCCCCHCChCHCCCdg1WCCCV:YAowyFgjTiUkEwt6OlvaeEpIaCtwUaSe

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a7df021bfd03e579860ae38b29bd25b0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\a7df021bfd03e579860ae38b29bd25b0_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1856
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Drops file in Windows directory
      PID:2216

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    83KB

    MD5

    7ade61cc3a5026d20e33424dc191318e

    SHA1

    71f18dad3f9c04328df30753e9829cc81c750f9f

    SHA256

    334aa774f0e41a4d929f5ced4f6586457ab274b6f41ad0b6f76ca238c7f63305

    SHA512

    ab117557751bdc0925598df19968bf2d365819ed21d26599a199179add9ca10aaf3597ad83af5b1ebfd140d7feef5cd38241164622e14454aaa48aa4af3c7d39

  • memory/1856-0-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/1856-6-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/2216-8-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/2216-10-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB