Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    31-05-2024 18:33

General

  • Target

    3885ab0ba1f5696660edb2ff83f748f0_NeikiAnalytics.exe

  • Size

    1.3MB

  • MD5

    3885ab0ba1f5696660edb2ff83f748f0

  • SHA1

    9111c9ac9aae58821902c702d9c6cfa40a80635e

  • SHA256

    31d83642449bc805b39c3c96ede7eb92b0c1fe96e8e80a3668452549d9448bf9

  • SHA512

    f256e73c28c9ed0f4bb75bb0882f68c8a4920a3c31ef62f1a8943e089399551634643960dd84dee4a478d06244c33759136802698c2a813df712f3728d0b3bb7

  • SSDEEP

    24576:VaPnAOx5SUXJW/D4xUa38vKdTIkpgSWC+osF0jzZVb+t35cMYlG96NMBJMncaMvT:V0x5SUW/cxUitIGLsF0nb+tJVYleAMzH

Malware Config

Extracted

Family

metasploit

Version

windows/download_exec

C2

http://2dbd-103-21-170-170.ngrok.io:80/Hth8

Attributes
  • headers User-Agent: Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0)

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3885ab0ba1f5696660edb2ff83f748f0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\3885ab0ba1f5696660edb2ff83f748f0_NeikiAnalytics.exe"
    1⤵
    • Modifies system certificate store
    PID:2168

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2168-0-0x0000000000250000-0x0000000000251000-memory.dmp
    Filesize

    4KB

  • memory/2168-16-0x00000000034E0000-0x00000000038E0000-memory.dmp
    Filesize

    4.0MB