Analysis

  • max time kernel
    149s
  • max time network
    113s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 20:17

General

  • Target

    696b32619485cd29639eec31e7223540_NeikiAnalytics.exe

  • Size

    410KB

  • MD5

    696b32619485cd29639eec31e7223540

  • SHA1

    ee00c37cbcab78c556f65e97c07d8c6c1031574e

  • SHA256

    11e5e06df2e6fbf29947e9157436b5fb933b5ca8897d040f905020b271e79fbd

  • SHA512

    d5d126a01ab78a37de5ea1c26029d67de03e79073264b190095285148003c3c55dc7b0547aea79cb3c12b4613012d7db4bdeb03507225fc8e80bf1ac5f6de6f1

  • SSDEEP

    12288:CxIK9V14ImyHYog7YYbt/uzyZguOTx76BDNlhDJN6yRvLX:CJEyYt7YJb7676yRvz

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\696b32619485cd29639eec31e7223540_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\696b32619485cd29639eec31e7223540_NeikiAnalytics.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3652
    • C:\ProgramData\iklwq.exe
      "C:\ProgramData\iklwq.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:4972

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Documents and Settings .exe

    Filesize

    410KB

    MD5

    25faf87e70ab89c3d2d749722bbdb06d

    SHA1

    fd7d0d4bdd060d8566c8b3552406e3a92c778ae1

    SHA256

    93a37bad2a93005cd556c761ac7d707386ad1bc219a5ed1853f569ff00af06df

    SHA512

    14eac99e6216b9b48f24d0db092b70236fa4eccde22fa157b34906d63769cd9e600ad6f4bc9f8ecb3b71dfd35b8526a4629c04b0bface9eaa1bbec04d7686eab

  • C:\ProgramData\Saaaalamm\Mira.h

    Filesize

    150KB

    MD5

    aef10b9ba25f907727558514f2dfbab0

    SHA1

    d67383ef1b23d4da72339d66de9541c2e1efaf53

    SHA256

    f5e77ddc706f6dffe056dc2f8a88adece36e0e4552bc70a85f36b1e01fe547ad

    SHA512

    5e607a70ca3fa489897f8df0c96570709839364cd8cabd5f76386dfff01ca2986d50c120cf82926dff950c7d7b6ec833ea7558b64ec8f0dfe2e5070abf1da103

  • C:\ProgramData\iklwq.exe

    Filesize

    259KB

    MD5

    e34821240404a8b9b07f3406653a8ac9

    SHA1

    d04a2b60f95d06e0dfefcd9472bf604e19925438

    SHA256

    c36568373cb7b7c79f441078458a299aaad196bd9174ff35c1af1947d5914c69

    SHA512

    e24b83a03065d561cb681e787fda20cb9509c79181c545710ab77d9cbb15d3488411df1ea7662dbeb46e9445589b1ba69a2a15bc8ad7dd36dfdd8b7e6ffec42c

  • memory/3652-0-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB

  • memory/3652-1-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB

  • memory/3652-8-0x0000000000400000-0x000000000047C000-memory.dmp

    Filesize

    496KB

  • memory/4972-130-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB