Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/05/2024, 13:16

General

  • Target

    1dcdd8ebecbbc30a0a5ee3dce9af1050_NeikiAnalytics.exe

  • Size

    408KB

  • MD5

    1dcdd8ebecbbc30a0a5ee3dce9af1050

  • SHA1

    febb307267059f9053664f853ad5a845aa62747b

  • SHA256

    fe46a90272057df9e9cada9bdcf5726cd406aa8c6900ac65ffd40d6865dd5f1a

  • SHA512

    78c37d619d9f7c9a149dd84385a232e4596602fe566dfdabc0fa154bc76de19535f5e64e6a55cdf60b71bc0466b2ea69b18edb6410fbd3b9e98b0bf5c3e7c14b

  • SSDEEP

    6144:4jlYKRF/LReWAsUyqEsAW7lea2x3UPtBiu3ISqQ+BNpM+qudH3VGuUXHBJJsz:4jauDReWgt2x32Biu3InB76Hhsz

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1dcdd8ebecbbc30a0a5ee3dce9af1050_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\1dcdd8ebecbbc30a0a5ee3dce9af1050_NeikiAnalytics.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4412
    • C:\ProgramData\hmpdx.exe
      "C:\ProgramData\hmpdx.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:3500

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Documents and Settings .exe

    Filesize

    408KB

    MD5

    5c10ef23c254945798bef311bbf17142

    SHA1

    b680acd4184671e5b648873046e7938d68b75702

    SHA256

    a2bbbca90b26990cfa924e46bf8090584053cb1cf11253671a50eca10ee85079

    SHA512

    912ea5b09f71d48d43c87fe99721563e8c54d940a31177620a5352a8618dab8cfae04f515b20b7c6b1d4f772964b483a9132371a5fc56122e7dd896979128369

  • C:\ProgramData\Saaaalamm\Mira.h

    Filesize

    136KB

    MD5

    cb4c442a26bb46671c638c794bf535af

    SHA1

    8a742d0b372f2ddd2d1fdf688c3c4ac7f9272abf

    SHA256

    f8d2c17bdf34ccfb58070ac8b131a8d95055340101a329f9a7212ac5240d0c25

    SHA512

    074a31e8da403c0a718f93cbca50574d8b658921193db0e6e20eacd232379286f14a3698cd443dc740d324ad19d74934ae001a7ad64b88897d8afefbc9a3d4e3

  • C:\ProgramData\hmpdx.exe

    Filesize

    271KB

    MD5

    f24aacdd819aa480c2938b6c01f31b04

    SHA1

    209117c7f05839ba8797cfb6be0d535ca607f523

    SHA256

    ca04478e20af0b1a1dc6a3845814f711b87ccdecba28f78e63bb272a4b90013e

    SHA512

    dcb7e4e5358613adb1ff3c510a1efdc055e412a73106a32a72e95650569559bef55c2776dd325c214c031323cf7b2229118cf8c032d96d84499daa8c1fca37f5

  • memory/3500-130-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB

  • memory/4412-0-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/4412-1-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/4412-9-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB