Analysis

  • max time kernel
    149s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    02-06-2024 00:47

General

  • Target

    1631bf0f060eff672a364649e5f26060_NeikiAnalytics.exe

  • Size

    45KB

  • MD5

    1631bf0f060eff672a364649e5f26060

  • SHA1

    b1ab49664143b22ddfad82eb6afc2409cf2c4a0f

  • SHA256

    448cde8603bc989676e1f30f2fc0c13a93ff437bb7ff438712df7d3426eaabfa

  • SHA512

    b681dbf7546778679c781df1b94b1d8c1214814b5c47f422d89901b702695e4ba37da2ff0f8d159a75522c7e92e750dafac53022ce56183a800b435885a69f18

  • SSDEEP

    768:P6LsoEEeegiZPvEhHS5+Mh/QtOOtEvwDpjBpaD3TUogs/VXpAPhv:P6QFElP6k+MRQMOtEvwDpjBQpVXKv

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1631bf0f060eff672a364649e5f26060_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\1631bf0f060eff672a364649e5f26060_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2164
    • C:\Users\Admin\AppData\Local\Temp\asih.exe
      "C:\Users\Admin\AppData\Local\Temp\asih.exe"
      2⤵
      • Executes dropped EXE
      PID:2812

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\asih.exe

    Filesize

    45KB

    MD5

    6971dabd9be3dbbe4280c2b339642a7c

    SHA1

    86f1f15bb2c615658e1ddaa3af77b0d8ee0eaec8

    SHA256

    f34e17026f07d10e500fb2abeb89fe9c55176f95ed8b3b99479903fcfc304389

    SHA512

    02611564ba0619eb627bc765a8db303d8e4cd32cc3ab99685911e83eddf25f132275e6412563a9546211e305c3b0b3350875057c0068bf78ed0f2f06e993e7e8

  • memory/2164-0-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/2164-1-0x0000000000330000-0x0000000000336000-memory.dmp

    Filesize

    24KB

  • memory/2164-2-0x0000000000470000-0x0000000000476000-memory.dmp

    Filesize

    24KB

  • memory/2164-9-0x0000000000330000-0x0000000000336000-memory.dmp

    Filesize

    24KB

  • memory/2164-15-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB

  • memory/2812-17-0x0000000000380000-0x0000000000386000-memory.dmp

    Filesize

    24KB

  • memory/2812-24-0x0000000000240000-0x0000000000246000-memory.dmp

    Filesize

    24KB

  • memory/2812-25-0x0000000000500000-0x000000000050B000-memory.dmp

    Filesize

    44KB