Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-05-2024 14:03

General

  • Target

    e13c5363fc89dcf5b39255ad36e9f8d0_NeikiAnalytics.exe

  • Size

    2.1MB

  • MD5

    e13c5363fc89dcf5b39255ad36e9f8d0

  • SHA1

    28b7432fdbeb047e1a5a7f86f95f78219aa1b62c

  • SHA256

    bb0490f1efe13e5c16f6e4c06aa72fd2c1f2f6fdeab01ea298978f877f894c8a

  • SHA512

    9b83095030932cc687e7e24e750a201774be8eccff6fdf73787b4fbd2360006338413dc62e6ccc0eb8f50ff47b618f441213c45c88f8aa2e81b07a56c8cbfd87

  • SSDEEP

    49152:YHswuzS+9FnHITYbNbNWo4kSH3OqtwIWmKkqXfd+/9AR:BH9lHIT4bNJFY3OqtWkqXf0Fe

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla payload 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e13c5363fc89dcf5b39255ad36e9f8d0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\e13c5363fc89dcf5b39255ad36e9f8d0_NeikiAnalytics.exe"
    1⤵
    • Enumerates system info in registry
    • Suspicious use of AdjustPrivilegeToken
    PID:4408

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4408-0-0x00007FF95E373000-0x00007FF95E375000-memory.dmp

    Filesize

    8KB

  • memory/4408-1-0x00000259A4B40000-0x00000259A4D5C000-memory.dmp

    Filesize

    2.1MB

  • memory/4408-2-0x00000259A5150000-0x00000259A5162000-memory.dmp

    Filesize

    72KB

  • memory/4408-3-0x00000259BF5A0000-0x00000259BF7B4000-memory.dmp

    Filesize

    2.1MB

  • memory/4408-4-0x00007FF95E370000-0x00007FF95EE31000-memory.dmp

    Filesize

    10.8MB

  • memory/4408-5-0x00000259C06F0000-0x00000259C072C000-memory.dmp

    Filesize

    240KB

  • memory/4408-6-0x00007FF95E370000-0x00007FF95EE31000-memory.dmp

    Filesize

    10.8MB

  • memory/4408-7-0x00007FF95E370000-0x00007FF95EE31000-memory.dmp

    Filesize

    10.8MB

  • memory/4408-8-0x00000259BF7B0000-0x00000259BF959000-memory.dmp

    Filesize

    1.7MB

  • memory/4408-10-0x00007FF95E373000-0x00007FF95E375000-memory.dmp

    Filesize

    8KB

  • memory/4408-9-0x00000259BF7B0000-0x00000259BF959000-memory.dmp

    Filesize

    1.7MB

  • memory/4408-11-0x00007FF95E370000-0x00007FF95EE31000-memory.dmp

    Filesize

    10.8MB

  • memory/4408-12-0x00007FF95E370000-0x00007FF95EE31000-memory.dmp

    Filesize

    10.8MB

  • memory/4408-13-0x00000259BF7B0000-0x00000259BF959000-memory.dmp

    Filesize

    1.7MB

  • memory/4408-14-0x00000259BF7B0000-0x00000259BF959000-memory.dmp

    Filesize

    1.7MB

  • memory/4408-15-0x00000259BF7B0000-0x00000259BF959000-memory.dmp

    Filesize

    1.7MB

  • memory/4408-16-0x00000259BF7B0000-0x00000259BF959000-memory.dmp

    Filesize

    1.7MB

  • memory/4408-17-0x00000259BF7B0000-0x00000259BF959000-memory.dmp

    Filesize

    1.7MB

  • memory/4408-18-0x00000259BF7B0000-0x00000259BF959000-memory.dmp

    Filesize

    1.7MB

  • memory/4408-19-0x00000259BF7B0000-0x00000259BF959000-memory.dmp

    Filesize

    1.7MB

  • memory/4408-20-0x00000259BF7B0000-0x00000259BF959000-memory.dmp

    Filesize

    1.7MB

  • memory/4408-21-0x00000259BF7B0000-0x00000259BF959000-memory.dmp

    Filesize

    1.7MB

  • memory/4408-22-0x00000259BF7B0000-0x00000259BF959000-memory.dmp

    Filesize

    1.7MB

  • memory/4408-23-0x00000259BF7B0000-0x00000259BF959000-memory.dmp

    Filesize

    1.7MB

  • memory/4408-24-0x00000259BF7B0000-0x00000259BF959000-memory.dmp

    Filesize

    1.7MB