Analysis

  • max time kernel
    149s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    17-05-2024 01:45

General

  • Target

    7ea0c2eb22b36257ccdde252a7aa8b80_NeikiAnalytics.exe

  • Size

    464KB

  • MD5

    7ea0c2eb22b36257ccdde252a7aa8b80

  • SHA1

    44e27c9ac927fc7cc97810a64b6e2a7041dda233

  • SHA256

    a2bbafc42c43ab3e7ebae90c3b73cb77ea6a5b43ac9c5b0bb7cbbb3ce9bf49b7

  • SHA512

    04c224147cc6bc6e8faefcb672ccab8b769bc3ef412edff2ccedf0227fb838fb3f79bea01a69f0636fa0fbd7b7b5b090acfe68ff5a612e2724e3a1e8c3fb27f1

  • SSDEEP

    6144:4jlYKRF/LReWAsUyQlUykJ+uhMNTiotgQKifYY5YkNvWtn8AzoBeYP:4jauDReWwUg/NTBtgQKMzRvWtOB3

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7ea0c2eb22b36257ccdde252a7aa8b80_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\7ea0c2eb22b36257ccdde252a7aa8b80_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3020
    • C:\ProgramData\picjd.exe
      "C:\ProgramData\picjd.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:2992

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Documents and Settings .exe

    Filesize

    464KB

    MD5

    3fa630ee77c28fe7575fd44423b6a63e

    SHA1

    f19a8ad39d575b8428866e76b4c9aabafc90ea41

    SHA256

    1a0ab2d1a2309b71160f3cb2ab282a65a5de316aba46937a11e52fb3b29407c0

    SHA512

    46c2cd807dd9e57e78ef278f525f9de68952000b9e79ae0db7575e8b8f11a6e9428095718e1cb23e23ac35a852e8a5a796c032b2c2c960da49f91bf42691dd0a

  • C:\ProgramData\Saaaalamm\Mira.h

    Filesize

    136KB

    MD5

    cb4c442a26bb46671c638c794bf535af

    SHA1

    8a742d0b372f2ddd2d1fdf688c3c4ac7f9272abf

    SHA256

    f8d2c17bdf34ccfb58070ac8b131a8d95055340101a329f9a7212ac5240d0c25

    SHA512

    074a31e8da403c0a718f93cbca50574d8b658921193db0e6e20eacd232379286f14a3698cd443dc740d324ad19d74934ae001a7ad64b88897d8afefbc9a3d4e3

  • \ProgramData\picjd.exe

    Filesize

    327KB

    MD5

    cdec750a7fccac11c4e69a7848af49ea

    SHA1

    1e14ac404734da29c16908d45bfd8d2b0d2be477

    SHA256

    abec28be4a4d869b72bc6a21b47708f1cf8aabc0560992de52053cf914eebf57

    SHA512

    db9113b1bc88463384ac79db30af601ec542eec63e230c7544e24d94c08c4f73420811d8e2734ca8ddfb0c2a8c642ff7d50c866b26a3987dccf34fd2a85dc373

  • memory/2992-137-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB

  • memory/3020-0-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/3020-1-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/3020-14-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB