Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    28-05-2024 12:57

General

  • Target

    44c9202f70c0c138264fe39813c43110_NeikiAnalytics.exe

  • Size

    30KB

  • MD5

    44c9202f70c0c138264fe39813c43110

  • SHA1

    247dc41e626b48b36d2207c893d58ebb940c5036

  • SHA256

    2421780c3302c25c411d5b147b2a0f12f9d57c980b40ea63e5a22fef3cd757a2

  • SHA512

    4b8ccde51dc1a5f027e97c7634d573e632a9dd95b9dd4b9e859086ea0db14067155544be165ab839949fc40717e22ea119c2955b79c1d88c60c011f290f25c3c

  • SSDEEP

    768:/qPJtEA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfh7cAz:/qkA6C1VqaqhtgVRNToV7TtRu8rM0wYF

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\44c9202f70c0c138264fe39813c43110_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\44c9202f70c0c138264fe39813c43110_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2320
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2848

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    31KB

    MD5

    ec63f639488efc947a610808f52900d7

    SHA1

    1c009cd6d46721c9e0a5af346f3bd776cef13137

    SHA256

    cbd9375fb3346904ad41654c2e4e88ae4c304d2bbac1e974bf27b54150d194a9

    SHA512

    3f09d2a11d72186851e03610707d3cc02147b62d19c6d69caa15fd147e78ed1e377c78edf96f4948e5ed6cc3f1b887066e0d97770e06338ccc95a17a7d30ea19

  • memory/2320-0-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/2320-3-0x00000000001B0000-0x00000000001B3000-memory.dmp

    Filesize

    12KB

  • memory/2320-7-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB