Analysis

  • max time kernel
    141s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/05/2024, 20:32

General

  • Target

    2cf9ab7713c55080eae952f3331429c0_NeikiAnalytics.exe

  • Size

    70KB

  • MD5

    2cf9ab7713c55080eae952f3331429c0

  • SHA1

    c7cd0da1aaee6b5830633eb64a59c09eccf3d61e

  • SHA256

    07c886327b0c7105ce251edaeb9117f8e8c470ee3f688ee05f4af6909a5ecb3b

  • SHA512

    583e0f01d7e18200faaab94cd437eecd3fc7ee9d21fc19ca695d34c164e5a19d1b48e833c0d1d45ec22f92319bb197e19eb47e335029c555fe0cd7c01d8ed47d

  • SSDEEP

    1536:5lrsicagdzn8K2ariPOcjk+XQuPVN72NMSRjqZ:5JjcF8KfCOcjk+guPVjSRS

Score
7/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2cf9ab7713c55080eae952f3331429c0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\2cf9ab7713c55080eae952f3331429c0_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    PID:4000
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1424 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:892

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SysWOW64\macromd\Bondage Fetish Foot Cum.exe

            Filesize

            96KB

            MD5

            2d654cc06332b5a2283d74c68ab72b71

            SHA1

            296b74253f905b05c6767238b98127e2d233006d

            SHA256

            0ec93661b718753f06b1e7762b16171dc36ffd555eebc201204abe30b67cce53

            SHA512

            e201a97f5f365a74e55fb9115aea1d539a92786fe9ba06e939fa54eed0e434ebc2e419615a5544c36ba224c8b40184c4eb2315e5b103585e27d8814b599e0e14

          • memory/4000-0-0x0000000000400000-0x0000000000467000-memory.dmp

            Filesize

            412KB

          • memory/4000-34-0x0000000000400000-0x0000000000467000-memory.dmp

            Filesize

            412KB