Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 00:39

General

  • Target

    63c7dce2483ae36d6c3475cde91ca7f0_NeikiAnalytics.exe

  • Size

    408KB

  • MD5

    63c7dce2483ae36d6c3475cde91ca7f0

  • SHA1

    d463f2c4bc5999806b9adae2678fd4c627e65c2e

  • SHA256

    b8b637c3d768e27e5945d174a2ffaecac50212a5d4b00b8db7af1e2de3a35c61

  • SHA512

    8ad3b56ec3e5428bfd8f0595e0e6fc7ee899b2853f6ab4e3c56f217efb603607f35d627b2abc5fd464d9073d4342a489b84da15158198924438667914971204e

  • SSDEEP

    12288:4jauDReWwqcAXOc1HzxXNbSGr4CDD5+umPNE:4DD0sXf1HzxXNbSGsCDD5+ux

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\63c7dce2483ae36d6c3475cde91ca7f0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\63c7dce2483ae36d6c3475cde91ca7f0_NeikiAnalytics.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5036
    • C:\ProgramData\dgbbpv.exe
      "C:\ProgramData\dgbbpv.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Documents and Settings .exe

    Filesize

    408KB

    MD5

    34e83b7eb1d2413a39bef8ec26d681a5

    SHA1

    0c8ace586e9269004787256a4b11c8feb8c332c5

    SHA256

    1fcb5a3a2c8e35b1640cd0112c75335b92e8fc5f30679ed3918e0aefb4a39de5

    SHA512

    eee178e1c54f00c1fa0fb6e033d67dc7c39f4eab3f80d72061ecd4798b50e2bc9326498395bbc65c25dc490617b44eb2c6352da739c9341b69220baf9bfb7e3f

  • C:\ProgramData\Saaaalamm\Mira.h

    Filesize

    136KB

    MD5

    cb4c442a26bb46671c638c794bf535af

    SHA1

    8a742d0b372f2ddd2d1fdf688c3c4ac7f9272abf

    SHA256

    f8d2c17bdf34ccfb58070ac8b131a8d95055340101a329f9a7212ac5240d0c25

    SHA512

    074a31e8da403c0a718f93cbca50574d8b658921193db0e6e20eacd232379286f14a3698cd443dc740d324ad19d74934ae001a7ad64b88897d8afefbc9a3d4e3

  • C:\ProgramData\dgbbpv.exe

    Filesize

    271KB

    MD5

    1ec6c638113688b766d9b4c826e7dc2e

    SHA1

    afb175ea96902be5793650497d16410194fba30f

    SHA256

    0e9fa51a6cb23124c61a8cec9b695c73f8793b54449ec5de118c7f492a4121f8

    SHA512

    801283106d5e3173c4654a835f983dfb9d2c9e7fc8ad84b4e711f86cb40b1ee0a1ba92a03c18fdcbff9352ed16ee4d9634117b845c302ce91bad57df21fe87e7

  • memory/764-130-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB

  • memory/5036-0-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/5036-1-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/5036-8-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB