Analysis
-
max time kernel
130s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 21:13
Static task
static1
Behavioral task
behavioral1
Sample
3d0cf751fb32bf70ed4f71aabebb3510_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3d0cf751fb32bf70ed4f71aabebb3510_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
3d0cf751fb32bf70ed4f71aabebb3510_NeikiAnalytics.exe
-
Size
1.6MB
-
MD5
3d0cf751fb32bf70ed4f71aabebb3510
-
SHA1
9cb2daa219930db66e9fbc0fdbd163b9ea530176
-
SHA256
0469f50854f0dde4fe6c3f21ce5718f8fce4d93b7c7f5c3d87a3be63cf8c8ca4
-
SHA512
00f5087887146714b6d0e4c7db9eafe272acf590046a2ddba359c4cebda16ce8b64ec88095bdb5887e16546af9df255a30f9da1fc16862884638b75d5b23ad1b
-
SSDEEP
49152:rjxgaz5WITYbNbNWo4kSH3OqtwIDYaRQ:HCazgIT4bNJFY3Oqt3Ye
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2980-4-0x0000021B273C0000-0x0000021B275D4000-memory.dmp family_agenttesla -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
3d0cf751fb32bf70ed4f71aabebb3510_NeikiAnalytics.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS 3d0cf751fb32bf70ed4f71aabebb3510_NeikiAnalytics.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer 3d0cf751fb32bf70ed4f71aabebb3510_NeikiAnalytics.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion 3d0cf751fb32bf70ed4f71aabebb3510_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
3d0cf751fb32bf70ed4f71aabebb3510_NeikiAnalytics.exedescription pid process Token: SeDebugPrivilege 2980 3d0cf751fb32bf70ed4f71aabebb3510_NeikiAnalytics.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2980-0-0x00007FF99AA53000-0x00007FF99AA55000-memory.dmpFilesize
8KB
-
memory/2980-1-0x0000021B0CC20000-0x0000021B0CDC8000-memory.dmpFilesize
1.7MB
-
memory/2980-2-0x0000021B0E9B0000-0x0000021B0E9C2000-memory.dmpFilesize
72KB
-
memory/2980-3-0x0000021B0E9E0000-0x0000021B0E9FA000-memory.dmpFilesize
104KB
-
memory/2980-4-0x0000021B273C0000-0x0000021B275D4000-memory.dmpFilesize
2.1MB
-
memory/2980-5-0x00007FF99AA50000-0x00007FF99B511000-memory.dmpFilesize
10.8MB
-
memory/2980-6-0x00007FF99AA50000-0x00007FF99B511000-memory.dmpFilesize
10.8MB
-
memory/2980-7-0x00007FF99AA50000-0x00007FF99B511000-memory.dmpFilesize
10.8MB
-
memory/2980-8-0x00007FF99AA53000-0x00007FF99AA55000-memory.dmpFilesize
8KB
-
memory/2980-9-0x00007FF99AA50000-0x00007FF99B511000-memory.dmpFilesize
10.8MB
-
memory/2980-10-0x00007FF99AA50000-0x00007FF99B511000-memory.dmpFilesize
10.8MB
-
memory/2980-11-0x00007FF99AA50000-0x00007FF99B511000-memory.dmpFilesize
10.8MB