Analysis

  • max time kernel
    134s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/06/2024, 19:07

General

  • Target

    e4fbb1c6e6e05149af0c2ea6e5c76dd0_NeikiAnalytics.exe

  • Size

    134KB

  • MD5

    e4fbb1c6e6e05149af0c2ea6e5c76dd0

  • SHA1

    5c02fde56e3eab41cc8c9693695b35363f9cb674

  • SHA256

    29c7e0b1f606719ec1b0c04e489f0f4fe75556447fa3dbbd4936ce994867c0df

  • SHA512

    5805f02ad37ea0eb90980157e8803e21e2b7a7abe396c96014be7f7b7d51141393248d2bdcda30d74ef29283fc51707b2734d7cf637e26cd6a9792924dbd33f2

  • SSDEEP

    1536:rF0AJELopHG9aa+9qX3apJzAKWYr0v7ioy6paK2AZqMIK7aGZh38QA:riAyLN9aa+9U2rW1ip6pr2At7NZuQA

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e4fbb1c6e6e05149af0c2ea6e5c76dd0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\e4fbb1c6e6e05149af0c2ea6e5c76dd0_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3088
    • C:\ProgramData\Update\WwanSvc.exe
      "C:\ProgramData\Update\WwanSvc.exe" /run
      2⤵
      • Executes dropped EXE
      PID:60

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\Update\WwanSvc.exe

          Filesize

          134KB

          MD5

          4527a557985e63577c4d8476d6a692b0

          SHA1

          32eea10723bab6ea2d0ccefd4789bcb4d1c7a668

          SHA256

          52743b0f1923a26d8f0e7b49a8a6dd0471855482f55cfaf944a83a33ac3d9af8

          SHA512

          a506ea0eb40e7df9822c35c92b92334fdaa4c24a38436c6896c52a862fd6cbfc3087c4d3d70c5f2c290e862863b4c04d5b363ad9065ff5538abfb475ccb0a234

        • memory/60-6-0x0000000000EC0000-0x0000000000EE8000-memory.dmp

          Filesize

          160KB

        • memory/60-7-0x0000000000EC0000-0x0000000000EE8000-memory.dmp

          Filesize

          160KB

        • memory/3088-0-0x00000000009C0000-0x00000000009E8000-memory.dmp

          Filesize

          160KB

        • memory/3088-4-0x00000000009C0000-0x00000000009E8000-memory.dmp

          Filesize

          160KB