Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/06/2024, 22:38

General

  • Target

    1034f9b64ef28b48f693520d4fa1b440_NeikiAnalytics.exe

  • Size

    2.7MB

  • MD5

    1034f9b64ef28b48f693520d4fa1b440

  • SHA1

    a2ec4916f45de16727b7acbf97efbd249234bf41

  • SHA256

    5fb062ee37a9fb3d7456f3bee8bbc0b2101b477a0a1df92506c62e98c87fb229

  • SHA512

    fad3ad1710d558fa8d5ff8fda4734c9f491a1fe85fe24b9ff7fc976a5de48ec25e27ee42c69d1ec64db1618dd657d5e3ab655a03eb36cdcf347beab54631c4e0

  • SSDEEP

    49152:+R0p8xHycIq+GI27nGroMPTJPer1c2HSjpjK3LBp9w4Sx:+R0pI/IQlUoMPdmpSpN4

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1034f9b64ef28b48f693520d4fa1b440_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\1034f9b64ef28b48f693520d4fa1b440_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4620
    • C:\SysDrvR5\devdobloc.exe
      C:\SysDrvR5\devdobloc.exe
      2⤵
      • Executes dropped EXE
      • NTFS ADS
      • Suspicious behavior: EnumeratesProcesses
      PID:1924
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1324 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4600

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\GalaxJ1\optidevec.exe

      Filesize

      2.7MB

      MD5

      976e8661e2b83b7d9381db6ce6b67f23

      SHA1

      dfa215c9c56de18f408514c7a55f029700908dc8

      SHA256

      c56e680d894e9352544e282334d562900a5cc5abd39706cf612c81ff3f06a6c9

      SHA512

      26ca827ee171c1aed8bd3be6c0958b9036f6689982f75cdf03ce83729c031527b2c06079a01e15987bcd7c9f974f824a224d029019f03b118ba3d5639299a9e4

    • C:\SysDrvR5\devdobloc.exe

      Filesize

      2.7MB

      MD5

      fbe130b469b218b98ca214a5ba27c577

      SHA1

      6103f0af7daf0318bdea8f8b0f48eab2f1045bc4

      SHA256

      f7637723163345d4c455d8103503010c714c372db16563dcbfb070963c4208ea

      SHA512

      4e39b01e88ba830229ab3b2b82982bf9b8c55012bc803abfa0165f53a36ca82fefca6338a26fc2b2f7db491ca90690ba73ff315d92989cd060953dd751cec6d3

    • C:\Users\Admin\253086396416_10.0_Admin.ini

      Filesize

      207B

      MD5

      10924f9dc15c85728f94f79ff63e821b

      SHA1

      3f0732232e75e2c3b95d0b346e4046b81a22c315

      SHA256

      a9c9d6f24bdb50d9198160989404f4fb4c7582e69bd6e7f8f308e03a533ccdc3

      SHA512

      59c70fa592d107e6ecd2a35db8e2763498c98f124f98ba8cf825f0cf2e921124c0247a3dc6585b6c94945d28ad3b22f7ac973775cf2e56272a85683d99534807