Analysis
-
max time kernel
149s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30/05/2024, 04:03
Static task
static1
Behavioral task
behavioral1
Sample
63987fe8d7801fe5f1fcfc45d2cd0990_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
63987fe8d7801fe5f1fcfc45d2cd0990_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
63987fe8d7801fe5f1fcfc45d2cd0990_NeikiAnalytics.exe
-
Size
29KB
-
MD5
63987fe8d7801fe5f1fcfc45d2cd0990
-
SHA1
f3f41f4696b0dfd66cd63ccd4e9ca71fcf558a62
-
SHA256
58788f9f498e4fdce1a963573dc233847538882364dbe81eef553aa25f0d4a36
-
SHA512
5e6d31519462ebd57b6de65400504e5ce54fd4972441f123888b94c190614f2188f08fd38f5f984b0fb6ed5f2f46dc2155d18463c2a9f073cac56b304f69fcae
-
SSDEEP
768:/qPJtUA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKhJJhgc8:/q0A6C1VqaqhtgVRNToV7TtRu8rM0wYH
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 5084 microsofthelp.exe -
Executes dropped EXE 1 IoCs
pid Process 5084 microsofthelp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\microsofthelp = "C:\\Windows\\microsofthelp.exe" 63987fe8d7801fe5f1fcfc45d2cd0990_NeikiAnalytics.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\microsofthelp.exe 63987fe8d7801fe5f1fcfc45d2cd0990_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4436 wrote to memory of 5084 4436 63987fe8d7801fe5f1fcfc45d2cd0990_NeikiAnalytics.exe 83 PID 4436 wrote to memory of 5084 4436 63987fe8d7801fe5f1fcfc45d2cd0990_NeikiAnalytics.exe 83 PID 4436 wrote to memory of 5084 4436 63987fe8d7801fe5f1fcfc45d2cd0990_NeikiAnalytics.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\63987fe8d7801fe5f1fcfc45d2cd0990_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\63987fe8d7801fe5f1fcfc45d2cd0990_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Windows\microsofthelp.exe"C:\Windows\microsofthelp.exe"2⤵
- Deletes itself
- Executes dropped EXE
PID:5084
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5eb44760973999a48795c9e1d81982b5f
SHA1b9df4f5425125e9cb3e6f326bf509d9dbf830cf6
SHA256673e0bfcd27fc5c22adb3aa811084bc6a3af4065df22dc9dba33da58612dda3e
SHA5124d0a39ef2336b3629d5b0a65f4d05fb1d953b29da297d06e894e5ef2c54d8f1d2ba1cf5714a6acab4e124df2ede0c512d8af05f45449fc1b0f586098e4980e6a