Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    26-05-2024 05:03

General

  • Target

    6c4f1e759dc7382ed2909ea2e73b6c40_NeikiAnalytics.exe

  • Size

    91KB

  • MD5

    6c4f1e759dc7382ed2909ea2e73b6c40

  • SHA1

    7ceb2dd5e922f0e00d2bf0ed2f093b21bb67b6e7

  • SHA256

    62ca59fe2e9e1b4e026703e1f2814642d853fc794064a8bcb0c22f8ac9604622

  • SHA512

    6816d5564359757761ab600d1df1ae5c9736ac118d544396e6cb1464c7631d6fdd24fc258609fff3b0e778625480e44da7fed7d6d11e9f511810592731705804

  • SSDEEP

    1536:1WGxs9kGdYk8wO4Cnt8RUyho6CZyXP23q:UGfGdYSCnNyho68yl

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6c4f1e759dc7382ed2909ea2e73b6c40_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\6c4f1e759dc7382ed2909ea2e73b6c40_NeikiAnalytics.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2104
  • C:\Windows\SysWOW64\Winkvzr.exe
    C:\Windows\SysWOW64\Winkvzr.exe
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2424

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Winkvzr.exe

    Filesize

    86KB

    MD5

    a85d9d663611fc3f4744a25408655147

    SHA1

    c8ffc30a2222a22683a1b6220bb3468a0b4db679

    SHA256

    30544448f5f63e9cb956587fbba4b9b24f767176d0f13014f24f719c82983bd9

    SHA512

    5f86bab72fe64c5bcde791604007657374ebe902e8060b659abde1d597fec117a5fe2a3291a4272a6a0627ef790f06c8e0fc88c3c901b8f0997546c0e2f0029e