Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/05/2024, 09:11

General

  • Target

    9594cd49968f9e8f2c05c987ae867d80_NeikiAnalytics.exe

  • Size

    73KB

  • MD5

    9594cd49968f9e8f2c05c987ae867d80

  • SHA1

    ea9d02e07c9f239791515f0a34216a1f47389a5c

  • SHA256

    e9a0a62f07c1d4ed628ddbe0f4b6928f5bb81d8eb6d9a77f52ca3e8ed383c583

  • SHA512

    939a9ca640a26e4b6e9fc9e0a36629b4affe0085239ae7ef0cbe18c82451e340bd5ead87a91696dfcceaa63fc503d77df1047f885f8578d28bc069424933fd9c

  • SSDEEP

    1536:hbWJazkMYdK5QPqfhVWbdsmA+RjPFLC+e5hD0ZGUGf2g:hyY3qNPqfcxA+HFshDOg

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9594cd49968f9e8f2c05c987ae867d80_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\9594cd49968f9e8f2c05c987ae867d80_NeikiAnalytics.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4800
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c [email protected]
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3756
      • C:\Users\Admin\AppData\Local\Temp\[email protected]
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4848
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c 00.exe
          4⤵
            PID:1516

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\[email protected]

      Filesize

      73KB

      MD5

      05ac1c00bb3f83c7d069511cba7705eb

      SHA1

      eb8ec20d3ce1c59ab5289917ea3e218baa458f8c

      SHA256

      a31d384f03ca0f20984045d7edc8c97e3babd57c64f897bd7649c6147124a9c1

      SHA512

      4a8769d77cb9c09a41a66eeb045f0956dfd662088d6f1263db4af4ec79748df9eb77dee546a564d2b03cd37beb453ea5f08e8e8804fefd27cc5ad85e3baffa06

    • C:\Users\Admin\AppData\Local\Temp\00.exe

      Filesize

      2KB

      MD5

      7b621943a35e7f39cf89f50cc48d7b94

      SHA1

      2858a28cf60f38025fffcd0ba2ecfec8511c197d

      SHA256

      bef04c2f89dc115ce2763558933dba1767bf30cda6856d335ae68955923f9991

      SHA512

      4169e664ad4e7e6891a05ceed78465e0ec44879b37fc0de97c014945e10c161f6bfb040efc24edc136e69bb115b2a1327b04cefb58141f712da856129872e8f1

    • memory/4800-8-0x0000000000400000-0x0000000000419000-memory.dmp

      Filesize

      100KB

    • memory/4848-7-0x0000000000400000-0x0000000000419000-memory.dmp

      Filesize

      100KB