Analysis

  • max time kernel
    132s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-05-2024 22:19

General

  • Target

    6a976da74ae4e3078cebedaa14711740_NeikiAnalytics.exe

  • Size

    79KB

  • MD5

    6a976da74ae4e3078cebedaa14711740

  • SHA1

    de6dd97799fa4079b593eead2f71d1b24fb34a4c

  • SHA256

    e199338ba972d79f74523570aa054e253aabc284de0f6b0967214f2efd6a13b0

  • SHA512

    876a491cbeee40891443af6503c1e8a2a422dea3d4ba042ab715ca8b6e94329b6e1400f0eec5e200d0b63b65988926f73de0690a34c7bddde8b100e343b83565

  • SSDEEP

    1536:zvI/UIvqd/7oYvzsYaKOQA8AkqUhMb2nuy5wgIP0CSJ+5yLK7B8GMGlZ5G:zvIZqdDNsYa/GdqU7uy5w9WMyLK7N5G

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6a976da74ae4e3078cebedaa14711740_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\6a976da74ae4e3078cebedaa14711740_NeikiAnalytics.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2324

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\[email protected]

    Filesize

    79KB

    MD5

    8fedac0cce6a8351dc32adc8babe6a0f

    SHA1

    f9779c7d9cfbcd5e5cdccbcd44f1b0a229acefe3

    SHA256

    4005122a90ae109bf969236a9b353615264126b34e750b9ad47f33e12dce4f07

    SHA512

    480e0dc3f9f5b23460470b90bd13c15ea24bb4d945e05e87fbd8e4b6f91093e0591902cbf3389e3ecb410208f0e10bece5ed3507eea696cd67b01256f33bcf87

  • memory/2324-6-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/3124-5-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB