Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 23:04

General

  • Target

    536ca6dad62e0cabba47b1d3269817a0_NeikiAnalytics.exe

  • Size

    97KB

  • MD5

    536ca6dad62e0cabba47b1d3269817a0

  • SHA1

    27fb50e481d67ff1f586b85010fb738876ac8759

  • SHA256

    5ddb820e9aad6cd504249aef19a8eacdc213a8c4bb7f973655df7a2bc15a3019

  • SHA512

    e95cc9af3833d08954e0c77f42e4005b1e2718b6aea2e46d60cf22fadd5ab663991592fad8326e5d5eaab798b3d3072ee0ea068b7a192dccf58fc0d7c632e02d

  • SSDEEP

    3072:5JjcF8KfCOcjk+guPVjSEhPlHb9VzPSM6pAX:5JonkkxudtvPSrAX

Score
7/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\536ca6dad62e0cabba47b1d3269817a0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\536ca6dad62e0cabba47b1d3269817a0_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    PID:2876

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\macromd\Teen Violent Forced Gangbang.exe
    Filesize

    89KB

    MD5

    1ead54efccbce25665f5e1f338996742

    SHA1

    02e535e3df209472a4584a216a4e839e0b6291dc

    SHA256

    11df4924ae511613b6a9d3d60ceeedc120e02a081d5525fea83c80ba5979420a

    SHA512

    129be498b8ce070b92ba919ec2e80294e94f135d95fcd48fdf15540eec7aa388da7b4ab4af7b911ce54774665aadadcb94d590403bd9b8758196c4b0bebc89e5

  • memory/2876-0-0x0000000000400000-0x0000000000467000-memory.dmp
    Filesize

    412KB

  • memory/2876-34-0x0000000000400000-0x0000000000467000-memory.dmp
    Filesize

    412KB