Analysis

  • max time kernel
    149s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/05/2024, 00:12

General

  • Target

    5bf8d1ad23f641857648cf8cecb165f0_NeikiAnalytics.exe

  • Size

    36KB

  • MD5

    5bf8d1ad23f641857648cf8cecb165f0

  • SHA1

    0adbfc17d5cf22651ce6ea288dfca558af05f2a4

  • SHA256

    ed45ed9cb8fff1ea71392370ee5232c8b898414963a0f2cc8ef71861c0ee12c9

  • SHA512

    6a2bc4058ff911004402d10d1c9e658ae93b983f3210240119cefb06fd0065aec38e9fef11972a138978389634eac1d7f5cc450bda3cc04333af9b1f7d54e0ff

  • SSDEEP

    768:/qPJtHA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhb:/qnA6C1VqaqhtgVRNToV7TtRu8rM0wY7

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5bf8d1ad23f641857648cf8cecb165f0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\5bf8d1ad23f641857648cf8cecb165f0_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4116
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:3480

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    36KB

    MD5

    f6628b26cdd5d94d45f0fa2e95740c26

    SHA1

    ea318d1e266e313fbedc357cc607c069a1f117cd

    SHA256

    48f69fae0a585e63bff77389f58c63bdcb43abf123cd1529ed13f755e8cfa3b5

    SHA512

    65b9d5d6131eba16d97b739d8c80cd7ce8472fef70ba33efd6785f0441b9ac12b00e03bdd9704b4b75c79a63807c882df5a1243189f45903e3c1df59965484d7

  • memory/4116-0-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/4116-4-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB