Analysis

  • max time kernel
    149s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/05/2024, 00:37

General

  • Target

    6f9062ab07d413e84dc4d9d019857240_NeikiAnalytics.exe

  • Size

    35KB

  • MD5

    6f9062ab07d413e84dc4d9d019857240

  • SHA1

    4d9c86c94ea3700b33ab1c6a6552f8c23e35b103

  • SHA256

    a0fd678ad508e154d59a3b324a553967740e0447f312e1330a06e137adb7ab89

  • SHA512

    c43e301d879511a8ed75b6025d91f2b4447fcab6a117f44be516105fa6f1c122e67150843b4c4990e1427dce818cd3327a13754bd920285552e527ee1a280dc4

  • SSDEEP

    768:/qPJtHA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhz:/qnA6C1VqaqhtgVRNToV7TtRu8rM0wYT

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f9062ab07d413e84dc4d9d019857240_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\6f9062ab07d413e84dc4d9d019857240_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:5032
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:220

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\microsofthelp.exe

          Filesize

          35KB

          MD5

          0a39f6635aa28218f38aa85cb6a9b217

          SHA1

          5c5252a699a79aa29b7c6d3bc21b671d2ad7761e

          SHA256

          6325856649ee86dadbf4039d8807c59a12990b089049836b5c6cf5258245c4a5

          SHA512

          d05d1635aab5d34d7184ef5fa296309813c542e9dc43defdf6e15614d0c04a20942c494437589e2aeadc4bb0348f49991130bb134a42f3efb9502deec0fdc3a8

        • memory/220-5-0x0000000000400000-0x0000000000403000-memory.dmp

          Filesize

          12KB

        • memory/5032-0-0x0000000000400000-0x0000000000403000-memory.dmp

          Filesize

          12KB