Analysis

  • max time kernel
    126s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 00:35

General

  • Target

    633449cfe2b1d2ffc9af1b5dadaaf310_NeikiAnalytics.exe

  • Size

    48KB

  • MD5

    633449cfe2b1d2ffc9af1b5dadaaf310

  • SHA1

    10a08fff4369258e05cf9ad96da7a60181fe4fc2

  • SHA256

    d26da5d824f993aba49294e220c3bc4db6555299ba173cce8b1b5c2fdc384963

  • SHA512

    95f98cefb66bf1e0f5a8f7859c2bf5fab011549d86b75b363a12e1904b1c1f97a4058f739e2b6a93a067242eab054a9ca74d0d8f46255e2f7d2400de8e0ae38c

  • SSDEEP

    768:dD2oV2AJblQRNLzFrSNTVebqxjxMQhMk6Cr3H3g:dCoVXGRTuhBxj/hH3Hw

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\633449cfe2b1d2ffc9af1b5dadaaf310_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\633449cfe2b1d2ffc9af1b5dadaaf310_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:848
    • C:\Users\Admin\AppData\Local\Temp\supdater.exe
      "C:\Users\Admin\AppData\Local\Temp\supdater.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:2088

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\supdater.exe
    Filesize

    48KB

    MD5

    76d8b3e842aed981df14ec40282100fa

    SHA1

    a066cc2e3e0efeea9d056e11582554541fe315f2

    SHA256

    79349f7ba51d7965937a04425e19e47f58e680685ec2711b44ef829a95dc6ca1

    SHA512

    0b68bc756f9c0dc4006491d333079eff318108ebe1b4a1c5c34b4028366471423a5a257d52bb0732de9b71e482abca7e9f0c83bf0a5030b5eea1c264339b806e

  • memory/848-1-0x0000000000501000-0x0000000000502000-memory.dmp
    Filesize

    4KB

  • memory/2088-8-0x0000000000500000-0x0000000000507000-memory.dmp
    Filesize

    28KB