Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 23:33

General

  • Target

    58d8aa831f73a304739cbb8c8471ad60_NeikiAnalytics.exe

  • Size

    408KB

  • MD5

    58d8aa831f73a304739cbb8c8471ad60

  • SHA1

    77ec3dd8e5e4ea02a3fa33e0f7e73ffc869b3cdd

  • SHA256

    41ebc99152aeecc465451ca3e67188db63c9552c742a8e03b694cd99452d0652

  • SHA512

    257e727a46ccc3c0fa105be38254c76948913027aed8abaa85f021a2f12c79f580c7f82482814a2ed4b5ffc712207f83d2f24c12b606c3f9323dfee2dd8710ed

  • SSDEEP

    6144:4jlYKRF/LReWAsUyUNQUPRoc5AWl6rnt6R1MDmfRh0+OeeGVbUsD/Gdc4r6:4jauDReWSNQUPRoc5AW6rnM1MafbDUr6

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\58d8aa831f73a304739cbb8c8471ad60_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\58d8aa831f73a304739cbb8c8471ad60_NeikiAnalytics.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1948
    • C:\ProgramData\xuigt.exe
      "C:\ProgramData\xuigt.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:4124

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Documents and Settings .exe

    Filesize

    408KB

    MD5

    7283fa673c13394acbe4898534cb3e5b

    SHA1

    c67952c76f5dff35926762a8588ff19f8406a244

    SHA256

    b2959f3a722534bc9169fdff236eb8ed50fb0fff843b9290348c681146020b96

    SHA512

    63d92cea66833ed8620e82842f197fc6753b7e5b30a56e586f5c2782d2cb5badc0173f3b8c4670df517e8eddcda9a02b9f8a9f3709b32da3bcce8811f38d66b6

  • C:\ProgramData\Saaaalamm\Mira.h

    Filesize

    136KB

    MD5

    cb4c442a26bb46671c638c794bf535af

    SHA1

    8a742d0b372f2ddd2d1fdf688c3c4ac7f9272abf

    SHA256

    f8d2c17bdf34ccfb58070ac8b131a8d95055340101a329f9a7212ac5240d0c25

    SHA512

    074a31e8da403c0a718f93cbca50574d8b658921193db0e6e20eacd232379286f14a3698cd443dc740d324ad19d74934ae001a7ad64b88897d8afefbc9a3d4e3

  • C:\ProgramData\xuigt.exe

    Filesize

    271KB

    MD5

    2bb0787bd3e8cfc64809414b956950e8

    SHA1

    4b83e2646929217393c7c0d4f22e7cdbb41e26f6

    SHA256

    fb4c64e7d221c89bdc95213ee0fe19be35ee4129319a1f93d51a8c4f56ff39c0

    SHA512

    3d7f603c203eac97f70469a9b505fce24f77266cc173bf362b6f141b2ef2393919d254dab8d24f97e96c5c71a896d694aad2003f796b7307b03a8b9aca798567

  • memory/1948-0-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/1948-1-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/1948-8-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/4124-130-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB