Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    04-06-2024 23:57

General

  • Target

    1a387aba0904d633cf6e8a706fd1fb80_NeikiAnalytics.exe

  • Size

    611KB

  • MD5

    1a387aba0904d633cf6e8a706fd1fb80

  • SHA1

    3589a327061ded90733bfea24abafba4299b6f6b

  • SHA256

    6662af282b44e0ca13d421257fec9a081cc2292daa330789105ae97fbc0e56af

  • SHA512

    811f361c97a7b3d068f5b5494889843c504c8d52e2cbf1a64c391600a027f2f0dd290a06fb0ebafd3176cea9fcfced8f69f7d565841bfd6f105a1758cd922803

  • SSDEEP

    6144:NptVO7mOV1u9MV0ue9Ya47I9Ya4oXtamAV3vQnx04EFtUXMamoa9tG6tP/q8f/Pw:NhEDfP/q8fmRYCKREDAg

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a387aba0904d633cf6e8a706fd1fb80_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\1a387aba0904d633cf6e8a706fd1fb80_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2480
    • C:\Users\Admin\AppData\Local\Temp\budha.exe
      "C:\Users\Admin\AppData\Local\Temp\budha.exe"
      2⤵
      • Executes dropped EXE
      PID:1964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\budha.exe

    Filesize

    611KB

    MD5

    f9b2b873a0be6f64f5a72f28e545d88f

    SHA1

    cead724bf0607f7cfbe9614031bee324683d6793

    SHA256

    e6a6c8fd9ac81a1c2659f9e79f056c4b2b40c283bacef505cf2c503088260db7

    SHA512

    387b775184867e8137a49f03ae46714ee33c16e9280f6d36a94b25c9ead6fd8fdf7dd9bc2353856f48fafea0f6ea268149c5732762b9c3df998419fb84856c27

  • memory/1964-10-0x0000000000400000-0x000000000049A000-memory.dmp

    Filesize

    616KB

  • memory/1964-15-0x0000000002BA0000-0x0000000002FA0000-memory.dmp

    Filesize

    4.0MB

  • memory/1964-14-0x0000000001EE0000-0x0000000001EE1000-memory.dmp

    Filesize

    4KB

  • memory/1964-16-0x0000000000400000-0x000000000049A000-memory.dmp

    Filesize

    616KB

  • memory/2480-0-0x0000000000400000-0x000000000049A000-memory.dmp

    Filesize

    616KB

  • memory/2480-1-0x0000000001EA0000-0x0000000001EA1000-memory.dmp

    Filesize

    4KB

  • memory/2480-3-0x0000000002C60000-0x0000000003060000-memory.dmp

    Filesize

    4.0MB

  • memory/2480-8-0x0000000003330000-0x00000000033CA000-memory.dmp

    Filesize

    616KB

  • memory/2480-12-0x0000000000400000-0x000000000049A000-memory.dmp

    Filesize

    616KB