Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 01:08

General

  • Target

    697fb0f8c78730b6cba4f3b9b52cac70_NeikiAnalytics.exe

  • Size

    408KB

  • MD5

    697fb0f8c78730b6cba4f3b9b52cac70

  • SHA1

    3192149c4a4aac588b99bdaf12bca867be074a36

  • SHA256

    45329668236a0ff52cbdf9fd577a6d322c2aebb4aeef6b8f633ce86e94cafd02

  • SHA512

    a626a6d6a5640170a1a80ac5acb54f838292fab042cb4c7f2b827e3bda1e76c417a1358c83e15d3e235e81a233498d298868b98fd2a1826e6c050ff5a9d368ea

  • SSDEEP

    6144:4jlYKRF/LReWAsUyCaeeM4Jc2y9dD460Wo/oJxh5h24fwEym6X/:4jauDReWJM2I460Wo/oHwq6X/

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\697fb0f8c78730b6cba4f3b9b52cac70_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\697fb0f8c78730b6cba4f3b9b52cac70_NeikiAnalytics.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1692
    • C:\ProgramData\drtdme.exe
      "C:\ProgramData\drtdme.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:1548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Documents and Settings .exe

    Filesize

    408KB

    MD5

    b5b2fcda22313fa60b87865862a6b472

    SHA1

    bbf1a918baa258831d3289b7022c970d8b38d62f

    SHA256

    b240a089bae5c4c37635fdcf744ff631bb35224cad654117ec11841614429a7b

    SHA512

    bf059b6dc7dce01ecb884912474e3c188fa5f7a1a95bec97912ed453356a292086a033ee762021680b15ccd11ca8301fc2cafad768ed6d2a23b3f7b000f53303

  • C:\ProgramData\Saaaalamm\Mira.h

    Filesize

    136KB

    MD5

    cb4c442a26bb46671c638c794bf535af

    SHA1

    8a742d0b372f2ddd2d1fdf688c3c4ac7f9272abf

    SHA256

    f8d2c17bdf34ccfb58070ac8b131a8d95055340101a329f9a7212ac5240d0c25

    SHA512

    074a31e8da403c0a718f93cbca50574d8b658921193db0e6e20eacd232379286f14a3698cd443dc740d324ad19d74934ae001a7ad64b88897d8afefbc9a3d4e3

  • C:\ProgramData\drtdme.exe

    Filesize

    271KB

    MD5

    4979b916cac8255305a2f393dedba37a

    SHA1

    3f07abec4e25a2257238b1e45643d632ebbb2efb

    SHA256

    10f6d0648b2a98fdf52861959cf9fb49637769b961abd2e93e053b36ad569b85

    SHA512

    5d2a72fcde0ebd47f15cc51c124afb38530b7ea321206174643fd0f827a99a54ede9188933dff98f3eb94529072d3bb5569f96216dafbb8bf62c9ffe92289eae

  • memory/1548-130-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB

  • memory/1692-0-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/1692-1-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/1692-8-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB