Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 01:50
Static task
static1
Behavioral task
behavioral1
Sample
13c8ef6c0c57d45795399e343f67f760_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
13c8ef6c0c57d45795399e343f67f760_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
13c8ef6c0c57d45795399e343f67f760_NeikiAnalytics.exe
-
Size
408KB
-
MD5
13c8ef6c0c57d45795399e343f67f760
-
SHA1
33a0cb7ca11cbc912519a7ebfba5cdfea2919381
-
SHA256
9fa2e4d90d28a9a4ed06dbaac7a8033446e6176fed581181f72a4503f9ca8755
-
SHA512
ecabe9436af890b2d5d0a493c4a528110309bc30d6daf239190c91d4e95d6e4b4476e7a05f80e3556caf5c037dbf16ecb88b14c9c9cef604db99fe16a7d92d28
-
SSDEEP
12288:4jauDReW1hCZgV7m/MeG1/u9FwicIJ9p4pYyV4SO:4DDvCZh35YlprVXO
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
rcmwxh.exepid process 1168 rcmwxh.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
rcmwxh.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\rcmwxh.exe" rcmwxh.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
13c8ef6c0c57d45795399e343f67f760_NeikiAnalytics.exedescription pid process target process PID 5008 wrote to memory of 1168 5008 13c8ef6c0c57d45795399e343f67f760_NeikiAnalytics.exe rcmwxh.exe PID 5008 wrote to memory of 1168 5008 13c8ef6c0c57d45795399e343f67f760_NeikiAnalytics.exe rcmwxh.exe PID 5008 wrote to memory of 1168 5008 13c8ef6c0c57d45795399e343f67f760_NeikiAnalytics.exe rcmwxh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\13c8ef6c0c57d45795399e343f67f760_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\13c8ef6c0c57d45795399e343f67f760_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\ProgramData\rcmwxh.exe"C:\ProgramData\rcmwxh.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1168
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD585255142c9e8b8f807c0d946fe1c19b5
SHA119fc1e6826447c6aca50dd577d930a1790837275
SHA256f854c20aaf5c38ea88af45931565fc0ab71d736161d6b8065281937a0f54a01e
SHA51298f0db91d8f403e576d476926d6459fd2300f2a55e421ff303eacdcda08165dda92d2578721369fec8780f76417061bd0af89c500c8e778c9c10f1380c602a29
-
Filesize
136KB
MD5cb4c442a26bb46671c638c794bf535af
SHA18a742d0b372f2ddd2d1fdf688c3c4ac7f9272abf
SHA256f8d2c17bdf34ccfb58070ac8b131a8d95055340101a329f9a7212ac5240d0c25
SHA512074a31e8da403c0a718f93cbca50574d8b658921193db0e6e20eacd232379286f14a3698cd443dc740d324ad19d74934ae001a7ad64b88897d8afefbc9a3d4e3
-
Filesize
271KB
MD5ae140a25d65983bf3098ec1e34327a90
SHA16a084a94e41b51c85e6190f10764be0ddd215fc5
SHA2567b3122171adb5f224f5ff96136d178b10d247f826d705aeb9dabe25dc2e40943
SHA512176b90f70ef0d1418691c9846ef0adbe80a6066bbd5f0d3cf1e59a1d2c3a99d94c40a766c518ab3697af8f5fb35126b001ff3153ec6321ccaf7639962449bc66