Analysis

  • max time kernel
    131s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    20/05/2024, 01:26

General

  • Target

    7f299dbe46f5cf3266643c04bedb13b0_NeikiAnalytics.exe

  • Size

    28KB

  • MD5

    7f299dbe46f5cf3266643c04bedb13b0

  • SHA1

    d9ef6ec335c8fb63b95f5d4f3f613c4ddb895ac9

  • SHA256

    7f140050767a31f90b69e525e458a1bcc18c859206b16cd28d954222e804216a

  • SHA512

    9bcc8483c3c93653b2edcfdd2045d4c5c99d336cd609e2e59d4b9fc3bea6cc0d5e2c6cb041a380ad32440cd87677eb0b7ed73067032cfed360e202cd9f87ee61

  • SSDEEP

    768:uxckEEd62J7F3Gih1uTRTUzT81V3/QoGqVBy:cc3jiF2ihRGV34L

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7f299dbe46f5cf3266643c04bedb13b0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\7f299dbe46f5cf3266643c04bedb13b0_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:384
    • C:\Users\Admin\AppData\Local\Temp\codecsupdater.exe
      "C:\Users\Admin\AppData\Local\Temp\codecsupdater.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:1908

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\codecsupdater.exe

    Filesize

    28KB

    MD5

    e0a95b4deab536ea272cb4fee7115fa1

    SHA1

    4310ad57f7eb160ff003d7fdf829810fe84bab3e

    SHA256

    972326cab52b5f3017e9c999bc96608033e8aafef699d83dede3fda6140c7923

    SHA512

    074de88fbceb22e98e009de9cb82ca4f4103751e6ea56a3a1ce281e596d76666cecaf95f23c6e2c20b821318ccb94daaa62951078e3af36b15a8fd16e9b92ad3

  • memory/384-1-0x0000000000401000-0x0000000000402000-memory.dmp

    Filesize

    4KB

  • memory/1908-8-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB