Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/06/2024, 02:41

General

  • Target

    236a2b6dbeab87da8746d68c20178710_NeikiAnalytics.exe

  • Size

    28KB

  • MD5

    236a2b6dbeab87da8746d68c20178710

  • SHA1

    6487e56cfa7fa4394b2f3bf8dc26754b94a6d741

  • SHA256

    1a9e354e8e50d623cce6b3ddbfa2877a737851a154864409d9927d4f35ba25b7

  • SHA512

    32d9e8e292491348fdddc240679135f0b39e8a0dcb4ef6a9a50c4d3582a5e1dea78d41b556d23e9fa76c5e33a64c232093b9eca73b83ceb8be63bb8004003914

  • SSDEEP

    768:/qPJtUA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKhJJhgcr:/q0A6C1VqaqhtgVRNToV7TtRu8rM0wYY

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\236a2b6dbeab87da8746d68c20178710_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\236a2b6dbeab87da8746d68c20178710_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2156
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:5036

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\microsofthelp.exe

          Filesize

          28KB

          MD5

          85e4ecdaed1c26213ecebadca1f15b3c

          SHA1

          70b8ede6bdddfe39f77ba7987e44f6784ac6f993

          SHA256

          ee5532f7c83f46d5d917f9a8e404d3c9ee2254d0407a05661e4de3388bf4aaa2

          SHA512

          5cc3b17967d4492de01129bfa45ae75ece0c41f027afb9bbe218f107a74a79903100587fa403a453256f41fb0dd257bdc6b5780c43926ded949af8a416f1103a

        • memory/2156-0-0x0000000000400000-0x0000000000403000-memory.dmp

          Filesize

          12KB

        • memory/2156-4-0x0000000000400000-0x0000000000403000-memory.dmp

          Filesize

          12KB