Analysis

  • max time kernel
    149s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    17/05/2024, 10:34

General

  • Target

    e980f623f2538b7ddb835b3df9a6e5f0_NeikiAnalytics.exe

  • Size

    34KB

  • MD5

    e980f623f2538b7ddb835b3df9a6e5f0

  • SHA1

    c1c3e28b0330412abcd9df0ff113d086538343c4

  • SHA256

    5f2a8b916edd18ab8ba60c59c1a261154c5a3b67d20a7c55b442cda41360b7db

  • SHA512

    3e99ef5bde6721af423dfa976df7f64a888c46ba8094d2a3f362a3fb4be7205a65a6384381562066f1a26140098f224670c203eb366196f2edbadc0c12114ada

  • SSDEEP

    768:/qPJtHA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhU:/qnA6C1VqaqhtgVRNToV7TtRu8rM0wY0

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e980f623f2538b7ddb835b3df9a6e5f0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\e980f623f2538b7ddb835b3df9a6e5f0_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2868
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2280

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    34KB

    MD5

    69a9ea89742899717949a067347e33d9

    SHA1

    3cc8e232b1b25e8591c8a6c70c4bb8c7c289cbd2

    SHA256

    25521b4138a86869fb8932a3fd94bef05a912b31dd43a58fb591d6cbcd3a89b6

    SHA512

    9b0f9948972d038598900afdde610789b644501ca9f535d540430bad8221fec9d20447f30d0cca8af5c74144e8e8137bc726a64e08f1f2665d64271bd650cbe3

  • memory/2280-9-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/2868-7-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/2868-5-0x0000000000220000-0x0000000000223000-memory.dmp

    Filesize

    12KB

  • memory/2868-0-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB