Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
16-05-2024 14:03
Static task
static1
Behavioral task
behavioral1
Sample
e13c5363fc89dcf5b39255ad36e9f8d0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e13c5363fc89dcf5b39255ad36e9f8d0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
e13c5363fc89dcf5b39255ad36e9f8d0_NeikiAnalytics.exe
-
Size
2.1MB
-
MD5
e13c5363fc89dcf5b39255ad36e9f8d0
-
SHA1
28b7432fdbeb047e1a5a7f86f95f78219aa1b62c
-
SHA256
bb0490f1efe13e5c16f6e4c06aa72fd2c1f2f6fdeab01ea298978f877f894c8a
-
SHA512
9b83095030932cc687e7e24e750a201774be8eccff6fdf73787b4fbd2360006338413dc62e6ccc0eb8f50ff47b618f441213c45c88f8aa2e81b07a56c8cbfd87
-
SSDEEP
49152:YHswuzS+9FnHITYbNbNWo4kSH3OqtwIWmKkqXfd+/9AR:BH9lHIT4bNJFY3OqtWkqXf0Fe
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral2/memory/4408-3-0x00000259BF5A0000-0x00000259BF7B4000-memory.dmp family_agenttesla -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS e13c5363fc89dcf5b39255ad36e9f8d0_NeikiAnalytics.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer e13c5363fc89dcf5b39255ad36e9f8d0_NeikiAnalytics.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion e13c5363fc89dcf5b39255ad36e9f8d0_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4408 e13c5363fc89dcf5b39255ad36e9f8d0_NeikiAnalytics.exe