Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/06/2024, 10:33

General

  • Target

    a03abacff4ae7e2606bbb76642771500_NeikiAnalytics.exe

  • Size

    79KB

  • MD5

    a03abacff4ae7e2606bbb76642771500

  • SHA1

    bcecd596f1e58c5f684ac24bac327c045ca21eab

  • SHA256

    73dec9c2a4420c82e511e194ae190c68ae7bcddd59ae9335db9059f5daf4484e

  • SHA512

    b81d2427555608a9d88c9000c0dd6a215c88f05f7d3d98737ba2fb3735a349c149d30b6615b0f81de525aecfc867e799a0d9cc4e0225508f907308d0aed15a74

  • SSDEEP

    1536:zvUaySa+bHSOR6POQA8AkqUhMb2nuy5wgIP0CSJ+5yAB8GMGlZ5G:zv6wHn6mGdqU7uy5w9WMyAN5G

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a03abacff4ae7e2606bbb76642771500_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\a03abacff4ae7e2606bbb76642771500_NeikiAnalytics.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2324

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\[email protected]

    Filesize

    79KB

    MD5

    67ed717d60d2ee007271fce28918dc6c

    SHA1

    8d5d33672d7cbf1d1618f3d31a7f2fbc45d8fa6c

    SHA256

    c29886bcba330ba93184d12ed2728353ec8e9aa3057414931481d5b7cd101fa4

    SHA512

    d6741c9f3efe277c08676ecff66416d0f25599caac09c67ee330e85d0f10c68a4cd1e724563667748b251c89938895b2b168eb2b9ce3f0ff19d7db8655489c02

  • memory/2324-6-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2844-5-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB