Analysis
-
max time kernel
148s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 01:50
Static task
static1
Behavioral task
behavioral1
Sample
13c8ef6c0c57d45795399e343f67f760_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
13c8ef6c0c57d45795399e343f67f760_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
13c8ef6c0c57d45795399e343f67f760_NeikiAnalytics.exe
-
Size
408KB
-
MD5
13c8ef6c0c57d45795399e343f67f760
-
SHA1
33a0cb7ca11cbc912519a7ebfba5cdfea2919381
-
SHA256
9fa2e4d90d28a9a4ed06dbaac7a8033446e6176fed581181f72a4503f9ca8755
-
SHA512
ecabe9436af890b2d5d0a493c4a528110309bc30d6daf239190c91d4e95d6e4b4476e7a05f80e3556caf5c037dbf16ecb88b14c9c9cef604db99fe16a7d92d28
-
SSDEEP
12288:4jauDReW1hCZgV7m/MeG1/u9FwicIJ9p4pYyV4SO:4DDvCZh35YlprVXO
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
mmravu.exepid process 2284 mmravu.exe -
Loads dropped DLL 2 IoCs
Processes:
13c8ef6c0c57d45795399e343f67f760_NeikiAnalytics.exepid process 1608 13c8ef6c0c57d45795399e343f67f760_NeikiAnalytics.exe 1608 13c8ef6c0c57d45795399e343f67f760_NeikiAnalytics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
mmravu.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\mmravu.exe" mmravu.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
13c8ef6c0c57d45795399e343f67f760_NeikiAnalytics.exedescription pid process target process PID 1608 wrote to memory of 2284 1608 13c8ef6c0c57d45795399e343f67f760_NeikiAnalytics.exe mmravu.exe PID 1608 wrote to memory of 2284 1608 13c8ef6c0c57d45795399e343f67f760_NeikiAnalytics.exe mmravu.exe PID 1608 wrote to memory of 2284 1608 13c8ef6c0c57d45795399e343f67f760_NeikiAnalytics.exe mmravu.exe PID 1608 wrote to memory of 2284 1608 13c8ef6c0c57d45795399e343f67f760_NeikiAnalytics.exe mmravu.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\13c8ef6c0c57d45795399e343f67f760_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\13c8ef6c0c57d45795399e343f67f760_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\ProgramData\mmravu.exe"C:\ProgramData\mmravu.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2284
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD5af5592d66c12c5c3b721e8b375f189bb
SHA1c43144f1fc5f231f0849f8ef7a1632ad2611e639
SHA25667ebf9f1f0914286668bf648d4758cc7f3693c2641422dd6c475b06365fd306a
SHA51215f4cd62cdf19f41ca745ce24ab6028ff2f9be0b5108ab4015adf443e228b3c9e4f4f7ff41ab98267562a836b103693e870e48201727e3da3e01c7bedb302841
-
Filesize
136KB
MD5cb4c442a26bb46671c638c794bf535af
SHA18a742d0b372f2ddd2d1fdf688c3c4ac7f9272abf
SHA256f8d2c17bdf34ccfb58070ac8b131a8d95055340101a329f9a7212ac5240d0c25
SHA512074a31e8da403c0a718f93cbca50574d8b658921193db0e6e20eacd232379286f14a3698cd443dc740d324ad19d74934ae001a7ad64b88897d8afefbc9a3d4e3
-
Filesize
271KB
MD5ae140a25d65983bf3098ec1e34327a90
SHA16a084a94e41b51c85e6190f10764be0ddd215fc5
SHA2567b3122171adb5f224f5ff96136d178b10d247f826d705aeb9dabe25dc2e40943
SHA512176b90f70ef0d1418691c9846ef0adbe80a6066bbd5f0d3cf1e59a1d2c3a99d94c40a766c518ab3697af8f5fb35126b001ff3153ec6321ccaf7639962449bc66