Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
21/05/2024, 09:30
Static task
static1
Behavioral task
behavioral1
Sample
2c8feae37d43157d25b85b6430c2a57adcb6c668c9b0736010bead7975715fa8_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2c8feae37d43157d25b85b6430c2a57adcb6c668c9b0736010bead7975715fa8_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
2c8feae37d43157d25b85b6430c2a57adcb6c668c9b0736010bead7975715fa8_NeikiAnalytics.exe
-
Size
35KB
-
MD5
e7b8aeea2c45fb34a1f3115ebcc32160
-
SHA1
38c6a5c44d71012be134bc1ce3643b949b22fec8
-
SHA256
2c8feae37d43157d25b85b6430c2a57adcb6c668c9b0736010bead7975715fa8
-
SHA512
15d871efadc038f31bf38f17291e53a3475b70f272b31f6ff7fccd2c40aa7e35fcdbe64e992235436e34b5cdd84cdd616c37698f356e27373f3454693c51fd6d
-
SSDEEP
768:/qPJtHA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhy:/qnA6C1VqaqhtgVRNToV7TtRu8rM0wYS
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 784 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 784 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 2c8feae37d43157d25b85b6430c2a57adcb6c668c9b0736010bead7975715fa8_NeikiAnalytics.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 2c8feae37d43157d25b85b6430c2a57adcb6c668c9b0736010bead7975715fa8_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2208 wrote to memory of 784 2208 2c8feae37d43157d25b85b6430c2a57adcb6c668c9b0736010bead7975715fa8_NeikiAnalytics.exe 29 PID 2208 wrote to memory of 784 2208 2c8feae37d43157d25b85b6430c2a57adcb6c668c9b0736010bead7975715fa8_NeikiAnalytics.exe 29 PID 2208 wrote to memory of 784 2208 2c8feae37d43157d25b85b6430c2a57adcb6c668c9b0736010bead7975715fa8_NeikiAnalytics.exe 29 PID 2208 wrote to memory of 784 2208 2c8feae37d43157d25b85b6430c2a57adcb6c668c9b0736010bead7975715fa8_NeikiAnalytics.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c8feae37d43157d25b85b6430c2a57adcb6c668c9b0736010bead7975715fa8_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\2c8feae37d43157d25b85b6430c2a57adcb6c668c9b0736010bead7975715fa8_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
PID:784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD525ed2d41d0a3a22d5833bf00cf65af51
SHA1ea09d96346bf9a4131910d1a25bc6fd854c68b81
SHA256f4e6f1d026422b9e85036cd72483fc0dc1421bd616ab90673b79ee28d303335f
SHA512b44381fa2227e28d42c216595a03238d084832bc4a85032726ff9e7cf14812fa8ecbdd290c31e259d23e8c55850ebc8f170297fb4066f397d120338b4a374d5a