Analysis

  • max time kernel
    135s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    31-05-2024 07:01

General

  • Target

    7bf464baed60f670c054cb739af72940_NeikiAnalytics.exe

  • Size

    5KB

  • MD5

    7bf464baed60f670c054cb739af72940

  • SHA1

    bd4da2ef963b695dc4a32ab19072c12052d97cef

  • SHA256

    a46d9d0cbdfe5be7f5b90d841b49e7d4af5ac0c710497658eebf972b3963cd56

  • SHA512

    d0fa18e19015eb6e5f58b719a4800fd7812e2d24c2b57d92560adc0047ea6f541244c53fce907a58bdd5eef8d6552bd2bb4e0808e97a6f6d440e46b17a21d9dc

  • SSDEEP

    48:qxipAmFRt/G9vIq7szErDyP2M1rsHB/VnC/RAxUI2CS70ALNx:vSoXhOsIYxuHnnwR2UI2ClAhx

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7bf464baed60f670c054cb739af72940_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\7bf464baed60f670c054cb739af72940_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3068
    • C:\Users\Admin\AppData\Local\Temp\retro.exe
      "C:\Users\Admin\AppData\Local\Temp\retro.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies system certificate store
      PID:2452

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\retro.exe

    Filesize

    5KB

    MD5

    c169ff825bc7e9779d7bade9101b77e2

    SHA1

    a860facf013d6cecc3d5fb02e3d4c97c1491a84f

    SHA256

    993b9e6983357077b381a3da25af78e59bac61e589fd1034385d2483d4168eba

    SHA512

    3d18a76741730ba9f0840dcf2d546263f5416557850c3d77f87af2f619c0f8c7f500a4ff3da35c0e4a4051e752700943c3006cac333873a91346138205c195ca