Analysis

  • max time kernel
    142s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/05/2024, 06:02

General

  • Target

    abd4fe16cbca5036999505e0e55d4fe0_NeikiAnalytics.exe

  • Size

    1.6MB

  • MD5

    abd4fe16cbca5036999505e0e55d4fe0

  • SHA1

    a788205812825ffe37559dfff0c44c33a81ad208

  • SHA256

    b004526c13ca785d643691de164225133fd0fef13e7a551d7fb46fa3cf757816

  • SHA512

    8dc13c97f10bdbca4571790afddce0ca40133993c33372b2c2970b25333071e24c253b6c236bd4fc10fb07b2bf34bea8219c8f9609ad2e65ddeb955aa4b4f556

  • SSDEEP

    24576:VcdmYuvFbVNM+d4cd+cdmYuvFbVNM+dOOT3E53Myyzl0hMf1tr7Caw8M01:QuvFbk+1uvFbk+v3EZpBh211Waw301

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\abd4fe16cbca5036999505e0e55d4fe0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\abd4fe16cbca5036999505e0e55d4fe0_NeikiAnalytics.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4540
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
      dw20.exe -x -s 968
      2⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious use of AdjustPrivilegeToken
      PID:456

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4540-0-0x00000000753D2000-0x00000000753D3000-memory.dmp

    Filesize

    4KB

  • memory/4540-1-0x00000000753D0000-0x0000000075981000-memory.dmp

    Filesize

    5.7MB

  • memory/4540-2-0x00000000753D0000-0x0000000075981000-memory.dmp

    Filesize

    5.7MB

  • memory/4540-9-0x00000000753D0000-0x0000000075981000-memory.dmp

    Filesize

    5.7MB