Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    31/05/2024, 23:12

General

  • Target

    83b585ba6f451b5920456d48a3152260_NeikiAnalytics.exe

  • Size

    5KB

  • MD5

    83b585ba6f451b5920456d48a3152260

  • SHA1

    d89f84c7382a54a359031b57e059f59badea1811

  • SHA256

    5fedf92d75c078809153831be8b6f24fd0468aa39c2e74361f89f0fb398cedde

  • SHA512

    fb496516f3fa7224181720644b9b2b769c79f87956e1cb5194ab37e8aa16bc4cbcf6a931978f47f61a37b6341f1128afb821ec2dcd4b6201ffd190d3d36a4d40

  • SSDEEP

    48:qa8xVL+AmcRB/G9UQ4mBgaaXx1rsHB/VnC/RAxUR2CS70ALNx:KLnRLXQ5VahuHnnwR2UR2ClAhx

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\83b585ba6f451b5920456d48a3152260_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\83b585ba6f451b5920456d48a3152260_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Users\Admin\AppData\Local\Temp\budha.exe
      "C:\Users\Admin\AppData\Local\Temp\budha.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2476

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\budha.exe

          Filesize

          5KB

          MD5

          66ba8c9d407b92c4c146d213e1fe7281

          SHA1

          4578139d3361847c9b111bf28e84f143baf02d0c

          SHA256

          8e1747d67c2815d0ff1c48506cbb41e4d4250bd416fe14c170c03a52d014ef3a

          SHA512

          e055bee6b98749d6ffce06005b4d5b88bbe5d7dd0cc6f34ad0cac0f16579e8a24609261107c3c8041b1edf43a9238e9d291e132d995719e98a93804a9aa21f45