Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 23:19

General

  • Target

    55baafafc41c3855bcd7aadcd19d5180_NeikiAnalytics.exe

  • Size

    408KB

  • MD5

    55baafafc41c3855bcd7aadcd19d5180

  • SHA1

    67070abc229a1f7f5c01a3905c445807549614ab

  • SHA256

    d3ce00408f2aa5401a61562efb65cc15dec9e7fab965992776115062c0cb7bb0

  • SHA512

    481a29039e052efa1e1b85d43249df669a3f44d589bace6437016897c0280fe4150e15808108220a9b8ca0093635b2fd511bf6e032c37ff6a96adc6936ecb5c3

  • SSDEEP

    12288:4jauDReW/XbI2Dn3M6fJZPsLaLnrkp9BPzHrNBHGx:4DDm6vPg8

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\55baafafc41c3855bcd7aadcd19d5180_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\55baafafc41c3855bcd7aadcd19d5180_NeikiAnalytics.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2096
    • C:\ProgramData\oxcjlv.exe
      "C:\ProgramData\oxcjlv.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:4384

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Documents and Settings .exe

    Filesize

    408KB

    MD5

    6102277ce8ca86168d0da038c37be9d8

    SHA1

    5f5bbd26c670b6389f7ee8217cb000620e441c80

    SHA256

    4e83d9f3d25961a520794de73d5c5e022d8f5dc4434f9df3550201d93646f955

    SHA512

    1763de920caa12e4179bf68e6ab5483988d2c23264d7a8ad626b3f97906bf79bda4de9711619e84599f312916b1c3d6c672e7b597db0178732bc3e96f4d0f1eb

  • C:\ProgramData\Saaaalamm\Mira.h

    Filesize

    136KB

    MD5

    cb4c442a26bb46671c638c794bf535af

    SHA1

    8a742d0b372f2ddd2d1fdf688c3c4ac7f9272abf

    SHA256

    f8d2c17bdf34ccfb58070ac8b131a8d95055340101a329f9a7212ac5240d0c25

    SHA512

    074a31e8da403c0a718f93cbca50574d8b658921193db0e6e20eacd232379286f14a3698cd443dc740d324ad19d74934ae001a7ad64b88897d8afefbc9a3d4e3

  • C:\ProgramData\oxcjlv.exe

    Filesize

    271KB

    MD5

    6701a5eee5ff3942cfd4de87aa96ab79

    SHA1

    9c26c573423931ce0fef0172524091305a18625e

    SHA256

    396a9cb136edacf24065f4c0bea02821d0bbe41b1fa73b58030698c2fb4432e5

    SHA512

    8bf2b9781970cee04451963016bb12aabd204bcbe073845b59d2acae1efec0a5c6ecae8573a7fb261ce916b05f0072c4c8c75e313d2478165862fae2dc1131b0

  • memory/2096-0-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/2096-1-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/2096-10-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/4384-130-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB