Analysis

  • max time kernel
    131s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 04:24

General

  • Target

    a6871764ec5da3454cd8cea008b612c0_NeikiAnalytics.exe

  • Size

    76KB

  • MD5

    a6871764ec5da3454cd8cea008b612c0

  • SHA1

    ef6d8331508e9dde3b0c5259be2d2bd628177cc5

  • SHA256

    d062dc8aaf63edd6f6c1d9bc7e6c7473909633d0127ac580309b05f4abf94418

  • SHA512

    939e6fac126d5ad6d21e1c4c3b520c78c477784507d19b5c8d2b2cf2d2140bdd5e3b34e5581f2e48575324d518c6b56c08e5950331731744c159cc58aab47bc3

  • SSDEEP

    1536:5lrsicagdzn8K2ariPOcjk+XQuPVN72NMSBCm78wcBKO:5JjcF8KfCOcjk+guPVjSBC08wG7

Score
7/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a6871764ec5da3454cd8cea008b612c0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\a6871764ec5da3454cd8cea008b612c0_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    PID:4448

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\macromd\AOL, MSN, Yahoo mail password stealer.exe
    Filesize

    90KB

    MD5

    b16e579a3e06d3362d864644ab4d8755

    SHA1

    d6320e841434dfa45fae61322dab8978ef0feb7f

    SHA256

    a0101192297d9940c6c92233946a0af4a11831173be413f1aec5b47e896df419

    SHA512

    815a3389225d3d8609f29507e845b1d9eab05de44f9e8a6ac47f3e8f9fecd03418c93f3eaad072da7436a3773529a26a099ed611f674509001864d20df929906

  • memory/4448-0-0x0000000000400000-0x0000000000467000-memory.dmp
    Filesize

    412KB

  • memory/4448-34-0x0000000000400000-0x0000000000467000-memory.dmp
    Filesize

    412KB