Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 01:50

General

  • Target

    13c8ef6c0c57d45795399e343f67f760_NeikiAnalytics.exe

  • Size

    408KB

  • MD5

    13c8ef6c0c57d45795399e343f67f760

  • SHA1

    33a0cb7ca11cbc912519a7ebfba5cdfea2919381

  • SHA256

    9fa2e4d90d28a9a4ed06dbaac7a8033446e6176fed581181f72a4503f9ca8755

  • SHA512

    ecabe9436af890b2d5d0a493c4a528110309bc30d6daf239190c91d4e95d6e4b4476e7a05f80e3556caf5c037dbf16ecb88b14c9c9cef604db99fe16a7d92d28

  • SSDEEP

    12288:4jauDReW1hCZgV7m/MeG1/u9FwicIJ9p4pYyV4SO:4DDvCZh35YlprVXO

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\13c8ef6c0c57d45795399e343f67f760_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\13c8ef6c0c57d45795399e343f67f760_NeikiAnalytics.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5008
    • C:\ProgramData\rcmwxh.exe
      "C:\ProgramData\rcmwxh.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:1168

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Documents and Settings .exe

    Filesize

    408KB

    MD5

    85255142c9e8b8f807c0d946fe1c19b5

    SHA1

    19fc1e6826447c6aca50dd577d930a1790837275

    SHA256

    f854c20aaf5c38ea88af45931565fc0ab71d736161d6b8065281937a0f54a01e

    SHA512

    98f0db91d8f403e576d476926d6459fd2300f2a55e421ff303eacdcda08165dda92d2578721369fec8780f76417061bd0af89c500c8e778c9c10f1380c602a29

  • C:\ProgramData\Saaaalamm\Mira.h

    Filesize

    136KB

    MD5

    cb4c442a26bb46671c638c794bf535af

    SHA1

    8a742d0b372f2ddd2d1fdf688c3c4ac7f9272abf

    SHA256

    f8d2c17bdf34ccfb58070ac8b131a8d95055340101a329f9a7212ac5240d0c25

    SHA512

    074a31e8da403c0a718f93cbca50574d8b658921193db0e6e20eacd232379286f14a3698cd443dc740d324ad19d74934ae001a7ad64b88897d8afefbc9a3d4e3

  • C:\ProgramData\rcmwxh.exe

    Filesize

    271KB

    MD5

    ae140a25d65983bf3098ec1e34327a90

    SHA1

    6a084a94e41b51c85e6190f10764be0ddd215fc5

    SHA256

    7b3122171adb5f224f5ff96136d178b10d247f826d705aeb9dabe25dc2e40943

    SHA512

    176b90f70ef0d1418691c9846ef0adbe80a6066bbd5f0d3cf1e59a1d2c3a99d94c40a766c518ab3697af8f5fb35126b001ff3153ec6321ccaf7639962449bc66

  • memory/1168-130-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB

  • memory/5008-0-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/5008-1-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/5008-9-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB