Analysis

  • max time kernel
    133s
  • max time network
    112s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-05-2024 02:11

General

  • Target

    503efa0bf90c646caf5dc14ac3583b30_NeikiAnalytics.exe

  • Size

    4.1MB

  • MD5

    503efa0bf90c646caf5dc14ac3583b30

  • SHA1

    0d82ae4b15978167e4ce606cd4ee7b132caaa3fb

  • SHA256

    1eaa4cd7a442e8473c47a67120920af751c1cbbe7e63543c1f5d206c5bbacbfa

  • SHA512

    2c9288aa459a62388014097919d88e7a7691d9044aa509a1978db24a3a4c8e5b765124ad193d0ce8eac48d8a1e98b29ea27cc0fdc893500d572d8c86b8b3f89d

  • SSDEEP

    98304:sqqTewvfzKDYxb2GA5Ir4Uu8j13PDmZ3uakQrBDhB:STlKIbBCe39mZ3uMrBDr

Score
6/10

Malware Config

Signatures

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Modifies registry class 11 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\503efa0bf90c646caf5dc14ac3583b30_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\503efa0bf90c646caf5dc14ac3583b30_NeikiAnalytics.exe"
    1⤵
    • Writes to the Master Boot Record (MBR)
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2936

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Defense Evasion

Pre-OS Boot

1
T1542

Bootkit

1
T1542.003

Replay Monitor

Loading Replay Monitor...

Downloads