Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 00:39
Static task
static1
Behavioral task
behavioral1
Sample
63c7dce2483ae36d6c3475cde91ca7f0_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
63c7dce2483ae36d6c3475cde91ca7f0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
63c7dce2483ae36d6c3475cde91ca7f0_NeikiAnalytics.exe
-
Size
408KB
-
MD5
63c7dce2483ae36d6c3475cde91ca7f0
-
SHA1
d463f2c4bc5999806b9adae2678fd4c627e65c2e
-
SHA256
b8b637c3d768e27e5945d174a2ffaecac50212a5d4b00b8db7af1e2de3a35c61
-
SHA512
8ad3b56ec3e5428bfd8f0595e0e6fc7ee899b2853f6ab4e3c56f217efb603607f35d627b2abc5fd464d9073d4342a489b84da15158198924438667914971204e
-
SSDEEP
12288:4jauDReWwqcAXOc1HzxXNbSGr4CDD5+umPNE:4DD0sXf1HzxXNbSGsCDD5+ux
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
dgbbpv.exepid process 764 dgbbpv.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
dgbbpv.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\dgbbpv.exe" dgbbpv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
63c7dce2483ae36d6c3475cde91ca7f0_NeikiAnalytics.exedescription pid process target process PID 5036 wrote to memory of 764 5036 63c7dce2483ae36d6c3475cde91ca7f0_NeikiAnalytics.exe dgbbpv.exe PID 5036 wrote to memory of 764 5036 63c7dce2483ae36d6c3475cde91ca7f0_NeikiAnalytics.exe dgbbpv.exe PID 5036 wrote to memory of 764 5036 63c7dce2483ae36d6c3475cde91ca7f0_NeikiAnalytics.exe dgbbpv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\63c7dce2483ae36d6c3475cde91ca7f0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\63c7dce2483ae36d6c3475cde91ca7f0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\ProgramData\dgbbpv.exe"C:\ProgramData\dgbbpv.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:764
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD534e83b7eb1d2413a39bef8ec26d681a5
SHA10c8ace586e9269004787256a4b11c8feb8c332c5
SHA2561fcb5a3a2c8e35b1640cd0112c75335b92e8fc5f30679ed3918e0aefb4a39de5
SHA512eee178e1c54f00c1fa0fb6e033d67dc7c39f4eab3f80d72061ecd4798b50e2bc9326498395bbc65c25dc490617b44eb2c6352da739c9341b69220baf9bfb7e3f
-
Filesize
136KB
MD5cb4c442a26bb46671c638c794bf535af
SHA18a742d0b372f2ddd2d1fdf688c3c4ac7f9272abf
SHA256f8d2c17bdf34ccfb58070ac8b131a8d95055340101a329f9a7212ac5240d0c25
SHA512074a31e8da403c0a718f93cbca50574d8b658921193db0e6e20eacd232379286f14a3698cd443dc740d324ad19d74934ae001a7ad64b88897d8afefbc9a3d4e3
-
Filesize
271KB
MD51ec6c638113688b766d9b4c826e7dc2e
SHA1afb175ea96902be5793650497d16410194fba30f
SHA2560e9fa51a6cb23124c61a8cec9b695c73f8793b54449ec5de118c7f492a4121f8
SHA512801283106d5e3173c4654a835f983dfb9d2c9e7fc8ad84b4e711f86cb40b1ee0a1ba92a03c18fdcbff9352ed16ee4d9634117b845c302ce91bad57df21fe87e7