Analysis

  • max time kernel
    149s
  • max time network
    107s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/05/2024, 09:10

General

  • Target

    0a4ebc4df890bf99d687dafb729bade0_NeikiAnalytics.exe

  • Size

    85KB

  • MD5

    0a4ebc4df890bf99d687dafb729bade0

  • SHA1

    6047867c4e38209d012e2f5fda08b567a0501532

  • SHA256

    50bb1491487a8a7757e5cdb14d2f201f2b60f4da6512f2307aaaac7698fc8157

  • SHA512

    3a8bfb55a30109633e3e04911bc42c577598ab00b642481ad602e3a1a65c097d9db54f0fa638302d9d3a727dee996f55f8d15ba62535dd06df91bf533f1e8c62

  • SSDEEP

    1536:/Ao0+j2d6rnJqlIUSJn3m2GnNCyuaMeFg8kVQ+SvMupWsZZZNF01Lryhv1g1s1Ej:/AoVl4lXin3m2GnNCyuaMeFg8kVQ+Svg

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a4ebc4df890bf99d687dafb729bade0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\0a4ebc4df890bf99d687dafb729bade0_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1688
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Drops file in Windows directory
      PID:4056

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    86KB

    MD5

    d4eb2353f449a672fb736f15a955f98f

    SHA1

    ae2798e9859a0a53a124af3c1129b31f714f232f

    SHA256

    029df49a85545612974b487dc840065fd5eff3ebb57bef7612401c80d976eb05

    SHA512

    519d32777dbbfdb291f02c7d0f58ca34eb9f4a44dcbe3f4ee739c7366ed7b335a1dd2ef4d9423375e93f3397a1077e2ddd3f0f43b697414eac97d5f109e7d74b

  • memory/1688-0-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/4056-5-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB