Analysis

  • max time kernel
    136s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 22:29

General

  • Target

    4c7e97ecb94bc87b3b19a10311eebaf0_NeikiAnalytics.exe

  • Size

    15KB

  • MD5

    4c7e97ecb94bc87b3b19a10311eebaf0

  • SHA1

    3c7387d71b41d459c8e4b3234c71eb9dc60a9a30

  • SHA256

    76cfeb408dc405740fde71234d76972bd36ed14bedf00a1f5c804025a4c708be

  • SHA512

    75f2ae67bd23bbb6fa382beedfd4259b31c3c7a69535578065ba929d577e6cbaa42129c105561e39351f2194115fb482c66fa59c3ee1b1b8bf9f0014e13f2bac

  • SSDEEP

    192:QeXn/CQWRIgaXNl3jOThiAGj445A1/eRU8Y3tCSr5MR:QaaQWRIgaHIiA64CA1/QXYdCSr54

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4c7e97ecb94bc87b3b19a10311eebaf0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\4c7e97ecb94bc87b3b19a10311eebaf0_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1976
    • C:\Users\Admin\AppData\Local\Temp\budha.exe
      "C:\Users\Admin\AppData\Local\Temp\budha.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:2920

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar2821.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Users\Admin\AppData\Local\Temp\budha.exe

    Filesize

    15KB

    MD5

    ee623cd5c3b3619cf42d4c8d5bedc30f

    SHA1

    d113239d29b0f3b8d13fb078dad51d45eacb7709

    SHA256

    8966c21efc670aa74090f309523758dcc9693199e40ecdccf5d844f44b61b21c

    SHA512

    26077c8dd5bd5a59e2ca41fb97ba9ede02f46c777739b3ec12d7304ade18c03a571a2c2f1703ba73891f5dcebb599971fee4fe04b89e8a324bc7302cee93f589

  • memory/1976-0-0x0000000000400000-0x0000000000407000-memory.dmp

    Filesize

    28KB