Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    29/05/2024, 10:26

General

  • Target

    512828426fa9ac1be885d653dfff63b0_NeikiAnalytics.exe

  • Size

    31KB

  • MD5

    512828426fa9ac1be885d653dfff63b0

  • SHA1

    7d23fc97b4b847c5a34dc7aa9b3264190be6697c

  • SHA256

    e55968cdeefdb537fb1499f88fbb3de71b536b47d6e9fc6c7f551d5f2d739869

  • SHA512

    83be51f1ecee7336ddac4fba567e85e8906ce757f1660c384bc49c276d2edd1aa5f487f4251958e53c3559cc7d9535906b06e1049752d4f409f89c26807ba02a

  • SSDEEP

    768:/qPJtUA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKhJJhgco:/q0A6C1VqaqhtgVRNToV7TtRu8rM0wYz

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\512828426fa9ac1be885d653dfff63b0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\512828426fa9ac1be885d653dfff63b0_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    31KB

    MD5

    bf2de9341a82d6de655a49678f53b378

    SHA1

    6c2bfbd5e6eb026d265bb90be61af34b34ee6feb

    SHA256

    334668d2da9f8701a1d791c3771b69e4cb10f9b1ed66e6314f8a4b7b685e7875

    SHA512

    2b364e65e4f4eefbb238643e037a83dd2a074261ee2dd16357971c955b444dc83c3d698479f012db57f42d70e40cd47cf8347b697042500f395c3e919af9dec8

  • memory/2180-0-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/2180-6-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/2372-8-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB