Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 01:53

General

  • Target

    71f440955fb2c27ea03f185d37f97a50_NeikiAnalytics.exe

  • Size

    41KB

  • MD5

    71f440955fb2c27ea03f185d37f97a50

  • SHA1

    447040c3058a20e69339c43d8a6d83441b2c8814

  • SHA256

    764ab83124ba3e11b7af7b174623f824101bd6caa80a565a6468e035314b7154

  • SHA512

    496872635730ebf6e1f5d03f14a711111fc30ca7d69dc340e6989538354cd53d4d4c9800609bf2bcd9f61d426f832833f76e0cf685bc1a0e445ac84bcb77a3f1

  • SSDEEP

    768:MApQr0ovdFJI34eGxusOy9Rp1pLeAxoeC48PqK1h7:MAaDJlMsh7pWezq

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\71f440955fb2c27ea03f185d37f97a50_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\71f440955fb2c27ea03f185d37f97a50_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:1132
    • C:\windows\SysWOW64\sal.exe
      "C:\windows\system32\sal.exe"
      2⤵
      • Executes dropped EXE
      PID:1284

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\SysWOW64\sal.exe
    Filesize

    41KB

    MD5

    8270b006ebbb60df5bc2c29495b8fe18

    SHA1

    138484e63d150e60f1bf7ca80ea424e66f7146ed

    SHA256

    3f68648417cb4619ab96118df11f6bb525a19276672c8e91db98a07b130793ab

    SHA512

    08627e9dcc5bad90593bd935e0e10803eea8beb1a633d2642aadbc24623c9ba165c9d0baff6c61943046b7cda32ff92c6615b83a12a759f0e9b2cde2c0d2971b

  • memory/1132-0-0x0000000000400000-0x0000000000409000-memory.dmp
    Filesize

    36KB

  • memory/1132-4-0x0000000000380000-0x0000000000389000-memory.dmp
    Filesize

    36KB

  • memory/1132-12-0x0000000000400000-0x0000000000409000-memory.dmp
    Filesize

    36KB

  • memory/1132-11-0x0000000000380000-0x0000000000389000-memory.dmp
    Filesize

    36KB

  • memory/1284-14-0x0000000000400000-0x0000000000409000-memory.dmp
    Filesize

    36KB