Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    23/05/2024, 22:54

General

  • Target

    9dfca57889825d484085c8b20fe3c990_NeikiAnalytics.exe

  • Size

    31KB

  • MD5

    9dfca57889825d484085c8b20fe3c990

  • SHA1

    b691ddd8062f2d673a51ccceb409a31dcacc3f8c

  • SHA256

    853709c19d42bd583c91534e1576c58d660fa557a9a91d4a869518054c08e6bd

  • SHA512

    f08d5d1ae22de6f61bf29846c3599cab2ed1629550cd37619debb816cf39a6f00b1115a26197a70e73b65c6ebc4921e4c71fd6a6857ac74f497c5f5db7577720

  • SSDEEP

    384:cMNn5/Hkj5JhkMP+OijAA4cOYWO6O9OqeMUUVfTuEpr80/OUf7O5bXWXjbOtHnAG:v//O3+O54nUCfTuEpYEOc7OVWXKHLUR0

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9dfca57889825d484085c8b20fe3c990_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\9dfca57889825d484085c8b20fe3c990_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:616
    • C:\Users\Admin\AppData\Local\Temp\ssion.exe
      "C:\Users\Admin\AppData\Local\Temp\ssion.exe"
      2⤵
      • Executes dropped EXE
      PID:2212

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\ssion.exe

          Filesize

          31KB

          MD5

          c40c150ade965068fe47f471a19b9d09

          SHA1

          34763b408fe5806becce04ec2e327e3fa512392f

          SHA256

          2fb440c5b74c5b9862c096dfad142fc2a62baa5271878e6baa806f3dc1a4fa83

          SHA512

          dca7bbefc822aca3155b4a3c210a881d69a9a396bdea9d885607bf64d3c31091244013ea847239457ea2462a4e2fbd724a8fef35ff1f911529de61dde9f3b52f

        • memory/616-1-0x0000000000401000-0x0000000000402000-memory.dmp

          Filesize

          4KB

        • memory/2212-11-0x0000000000400000-0x0000000000408000-memory.dmp

          Filesize

          32KB