Analysis

  • max time kernel
    140s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 20:52

General

  • Target

    38acdf9ff17b1939e2773ebba41ca7b0_NeikiAnalytics.exe

  • Size

    28KB

  • MD5

    38acdf9ff17b1939e2773ebba41ca7b0

  • SHA1

    1f1d016d1b6a3a6dbab64e9f490e686475af8dfc

  • SHA256

    1e3283f3b71ef5a7e3f99405145c7627be672fab7444697f269fbf8a8e4946bc

  • SHA512

    5470a044940c3cd99feb95bd1fffb0ec9551efb67ef2e8e49d90fded39a42fddf874a2053adf9e17e59f25469c996144664ef09d57827d759d02c40cd324a86b

  • SSDEEP

    384:YVeSrFqjmO/3zfNrP1T56TYpMYUzMk9hBcecystKqhMa82c7ky435/tVcOOCWq:YFNy3B1T5CN/zoyst/Mdn43RvcONWq

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\38acdf9ff17b1939e2773ebba41ca7b0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\38acdf9ff17b1939e2773ebba41ca7b0_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1868
    • C:\Users\Admin\AppData\Local\Temp\update_pdf.exe
      "C:\Users\Admin\AppData\Local\Temp\update_pdf.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system certificate store
      PID:1712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\update_pdf.exe

    Filesize

    28KB

    MD5

    378b185c8774c46437641a386f1ea6a8

    SHA1

    df0543071f77ee4bcfffff25e227c63774b82e5f

    SHA256

    98afc52a88b067f4d5c9e5851ec8ba669a3904c5507a7b0eb828f8ef3eb2e7d6

    SHA512

    8de4b220e6310ed8045ff9d8492cbdf3a253dabe9f4aef424fd0f9e863f4dac8191ecbef510faf6a586d25454e580b2c5aadf4e11bd42ea1cdc03876d08a30aa

  • memory/1712-11-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1712-17-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1712-16-0x0000000000020000-0x000000000002A000-memory.dmp

    Filesize

    40KB

  • memory/1712-15-0x0000000000020000-0x000000000002A000-memory.dmp

    Filesize

    40KB

  • memory/1712-32-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1712-34-0x0000000000020000-0x000000000002A000-memory.dmp

    Filesize

    40KB

  • memory/1712-36-0x0000000000020000-0x000000000002A000-memory.dmp

    Filesize

    40KB

  • memory/1712-35-0x0000000000020000-0x000000000002A000-memory.dmp

    Filesize

    40KB

  • memory/1868-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/1868-2-0x0000000000401000-0x0000000000402000-memory.dmp

    Filesize

    4KB

  • memory/1868-10-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB