Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/05/2024, 03:50

General

  • Target

    a4dfeace84dab4240aa280c00eceef30_NeikiAnalytics.exe

  • Size

    29KB

  • MD5

    a4dfeace84dab4240aa280c00eceef30

  • SHA1

    efaf14e91b63a06bd67f8a46ad80c72fc18ed707

  • SHA256

    2b3d3bd89dacdade56aad69864c804440a78a40879861be9529648dcce76a0ce

  • SHA512

    da71c89a70f23c7dec3cf46972100e2d52f167b5128ce7a8bf47f089707b7011164ba4757460e8abe9fa35fd6241137c160e72b9fdfc874ac713e765477b0317

  • SSDEEP

    768:IqPJtGA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhu:IqmA6C1VqaqhtgVRNToV7TtRu8rM0wYO

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a4dfeace84dab4240aa280c00eceef30_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\a4dfeace84dab4240aa280c00eceef30_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4020
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:4680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    29KB

    MD5

    9b42577831e401b1b8cdc9c2db534b9d

    SHA1

    6a670d885d63dc04ee1df020c1883ea6818d05b4

    SHA256

    6f3213f940ea91ed448341c5185059270c4fa20df84e80fc414dbffc8c8abbea

    SHA512

    08a5b6bf579c09b5ebe5464823946e39009929fcbe80e48ac3b3f1d0cb222a62dbaf9cb89921b2a84c1154e9cf262eee7d69ab75d8dfe0727eabc51f0230acad

  • memory/4020-0-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/4020-4-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB