Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    26/05/2024, 22:46

General

  • Target

    092f6f71f722f13549da234bae9b46f0_NeikiAnalytics.exe

  • Size

    34KB

  • MD5

    092f6f71f722f13549da234bae9b46f0

  • SHA1

    c47427f19ddb60b022233699a692f0e2b255e805

  • SHA256

    235770191eebab27e8ebf316689a654f77c4eec2e3e80f720c6a829bf5b94412

  • SHA512

    de1626eb85b8878dbc036217db0bef86c7eddf20afb251249f59e3c233db3959def05c22558e421692a3d8b93188e721081d671540b538dea66771d21033ff64

  • SSDEEP

    768:bxNQIE0eBhkL2Fo1CCwgfjOg9Arbkzos5z:bxNrC7kYo1Fxf2rY/

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\092f6f71f722f13549da234bae9b46f0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\092f6f71f722f13549da234bae9b46f0_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Users\Admin\AppData\Local\Temp\pissa.exe
      "C:\Users\Admin\AppData\Local\Temp\pissa.exe"
      2⤵
      • Executes dropped EXE
      • Modifies system certificate store
      PID:2540

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\pissa.exe

          Filesize

          34KB

          MD5

          b499fe6e4426af49e8965fa7c4d9b247

          SHA1

          a645448189032bc3b3a1828c8f38c1b25cc9aff8

          SHA256

          0e0bfbc591c3c169d74c51bd12c3b3d9eea2c96a4d83e456935c59435d9ba36f

          SHA512

          0a8b5d2bb68d3dde743579ff6c5cc7dcd0645e89a59e611c1b103abe644eda455f35c405f235ee87e05ebd98e965c0f7b1128e112a2516b217c6118ffb9b389a

        • memory/2208-1-0x00000000003B0000-0x00000000003B6000-memory.dmp

          Filesize

          24KB

        • memory/2208-8-0x00000000003A0000-0x00000000003A6000-memory.dmp

          Filesize

          24KB

        • memory/2208-0-0x00000000003A0000-0x00000000003A6000-memory.dmp

          Filesize

          24KB