Analysis

  • max time kernel
    149s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-05-2024 20:55

General

  • Target

    0deae4359430d7d665c73c4adc371400_NeikiAnalytics.exe

  • Size

    96KB

  • MD5

    0deae4359430d7d665c73c4adc371400

  • SHA1

    74c3bc3a70f3e8bcd57326c72f1dd8908a2594df

  • SHA256

    61a6c6afb5b2fb46cc08eda3878dfed2097da18d6cb0e7e52af412f88900c5f4

  • SHA512

    fc978fa7d3d1ed0b241dda7e61fff1f69e3b09084b8b7d2d21387212f3c5e408f3194f06a0d7ba282e1e837cd1e83604e71c1dfebe6a87c572fe7c2c2e34d466

  • SSDEEP

    3072:/AoVl4lXin3m2GnNCyuaMeFg8kVQ+SvMuYsZZZNF01Lryhv1g1sE1EEEhdeEBvMN:4rwC

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0deae4359430d7d665c73c4adc371400_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\0deae4359430d7d665c73c4adc371400_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4880
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Drops file in Windows directory
      PID:4448

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    96KB

    MD5

    1c46a5f50c714e504f12989b1ebacaad

    SHA1

    c4f49a5f2db8760e53265e7c44ebdc6471b4a9eb

    SHA256

    e9e4857c247af131ab8dc66fb3d89ca4c11c0f3b1ad38744bceae6cbcb9e6a6c

    SHA512

    39c8ed52a6866205e84cec3777e7f6b22f9be17bb72b1faaec4fae0eb371756df83d54f4b62e104e59cb4409b8ded6ff1dc12f3410b72e54bd6f3c6c3991973f

  • memory/4448-6-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/4880-0-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/4880-4-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB