Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/05/2024, 16:03

General

  • Target

    87abdd2ff08a30bc6829165088d4e990_NeikiAnalytics.exe

  • Size

    94KB

  • MD5

    87abdd2ff08a30bc6829165088d4e990

  • SHA1

    31659e878d7ba4d38658c09b8b4c665e46ce8cd2

  • SHA256

    35c63b1cea5146c45bf844c99879a105be05c4f3b06e1426c87492258064cb45

  • SHA512

    d6f5da79d2ea9f5e7a1f666065279a20b5d88068f62d81235f72b9dd8196f71d84e1cd2e59ce03d117572f6d5b4a32bb834f2f7680b50b122400cb79b1814ff1

  • SSDEEP

    1536:YAowfUJFgjT284U+w2EwRz6OlvaeEpIao/6NXznCCh+61CXCCCC9yttattvtHtgq:YAowyFgjTiUkEwt6OlvaeEpIao/6NDnV

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\87abdd2ff08a30bc6829165088d4e990_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\87abdd2ff08a30bc6829165088d4e990_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1020
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Drops file in Windows directory
      PID:3044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    94KB

    MD5

    a3adb07ed859e6190d22ceedd763fa1c

    SHA1

    ad96c544de307d6a076905196f16dc487e3af30c

    SHA256

    2324ce830d97fecd959354cc3ed17994f40e3c260372f2caae1a2d03ac438720

    SHA512

    81d10b0d1bc4b7178b1ccaad3fde46ded244ea5366032d0d8cc86b1b6190a7c90932a9e3210fd0fd476ec95014d9a87fba949fcc72bbcd9d5beb7ec8e9df5b43

  • memory/1020-0-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/1020-4-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/3044-6-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/3044-7-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB