Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-05-2024 10:38

General

  • Target

    3fc77f3f1bfa211e47d662fba0bbb810_NeikiAnalytics.exe

  • Size

    1.9MB

  • MD5

    3fc77f3f1bfa211e47d662fba0bbb810

  • SHA1

    c9211f3898b31746cfe77edadd90f3894ec4d690

  • SHA256

    399291c4d380e3d17db8cd04346d978cd54f5494ccd787b6eaa2a2a4e36bb9de

  • SHA512

    dbbdb262c3db172c5d9d811bd19dd9e2bb429d2c7563debc6f5d53d3cabaca164d0aaaf8fb24b9670298d64d1b94dfb5186c218c4c891ae5773b56234af8a334

  • SSDEEP

    24576:t6zoMzPoEcmUBa/irwbORluFQlijyOU8FEsuIfVH5E14H7vmVCx:tmfcvU/ir4ORYFeHK6IfVH5E14bvm

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3fc77f3f1bfa211e47d662fba0bbb810_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\3fc77f3f1bfa211e47d662fba0bbb810_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3960
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32 /s C:\Users\Admin\AppData\Local\Temp\mutil.dll
      2⤵
      • Loads dropped DLL
      • Modifies registry class
      PID:3840

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\mutil.dll

    Filesize

    264KB

    MD5

    5fdb19dfdc2f3b31138d2febbfabb4f7

    SHA1

    dbdbeed3f8a9ad7d3135fd58147d9c11d51dda5d

    SHA256

    414d12077f835d35448a1869b1bc6fe9449f2f950553b2f98aea7d1221a40812

    SHA512

    cd3afeca3f94253d9c3ffa97726867a0017db4fc7dfa9f6d3b0a219e1b492a676b0c5077b9753d17e89c943edfd491127f0bce1c2fe2623afd1e3438d032638b