Analysis
-
max time kernel
149s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 12:22
Static task
static1
Behavioral task
behavioral1
Sample
a3560e7436e96c2ac4ef9c02e17362f0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a3560e7436e96c2ac4ef9c02e17362f0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
a3560e7436e96c2ac4ef9c02e17362f0_NeikiAnalytics.exe
-
Size
408KB
-
MD5
a3560e7436e96c2ac4ef9c02e17362f0
-
SHA1
a8233402aab18d7e3b4e9ec2a0f4835be137614e
-
SHA256
252ad490fa447e160c84856e7dad0a2fc62dc369b7a4887c0a48a7451b7005c5
-
SHA512
95a56d2ac2708f897d999c42710dc76d2fe413d6df82e1dfa100c86fd2f948d1928fb51707afec6bc5c3dc7ef83c7998d7aec2fafd1d08b1ceb734a7167e5c5e
-
SSDEEP
6144:4jlYKRF/LReWAsUyba7VA9eL4na5gORvIHM:4jauDReWZY7snegORvIHM
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2948 nfkjba.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\nfkjba.exe" nfkjba.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4028 wrote to memory of 2948 4028 a3560e7436e96c2ac4ef9c02e17362f0_NeikiAnalytics.exe 83 PID 4028 wrote to memory of 2948 4028 a3560e7436e96c2ac4ef9c02e17362f0_NeikiAnalytics.exe 83 PID 4028 wrote to memory of 2948 4028 a3560e7436e96c2ac4ef9c02e17362f0_NeikiAnalytics.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3560e7436e96c2ac4ef9c02e17362f0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\a3560e7436e96c2ac4ef9c02e17362f0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\ProgramData\nfkjba.exe"C:\ProgramData\nfkjba.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD57341b0a47fcb38541aa2fd5f0676d3ad
SHA16ce50e5029b1c83f4729513f6be9167d91ca1c6b
SHA256bb44391619ad88578077e5d250a91ac8ecceb58ee31b4375301c3c326a918624
SHA5123cdd77cd09fbd44a5ad02512a18cfe43bed948ca35446219597303fe196b4e6c7588a46d3e1868873947b81706dcf8c65fdbaa68f5d228918462cf57af0d2115
-
Filesize
136KB
MD5cb4c442a26bb46671c638c794bf535af
SHA18a742d0b372f2ddd2d1fdf688c3c4ac7f9272abf
SHA256f8d2c17bdf34ccfb58070ac8b131a8d95055340101a329f9a7212ac5240d0c25
SHA512074a31e8da403c0a718f93cbca50574d8b658921193db0e6e20eacd232379286f14a3698cd443dc740d324ad19d74934ae001a7ad64b88897d8afefbc9a3d4e3
-
Filesize
271KB
MD550d922467aef566edef8dff0bf8c495f
SHA19f58361f5e4a100926bb6c649dd20710fb1e4811
SHA2568d5397e82d45a8176327732a0bf53572167a0d96c08fd85bcbfcba1510eade41
SHA512670bde97186f985f9364a8719fe191f0c30a50cfa0d32350e96b34b0c2db3f83e929c43faa8498679a2bf6ef31f09113480fc897193a0819cd7d8c9fb6d1ccb7