Analysis

  • max time kernel
    141s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-06-2024 11:10

General

  • Target

    51d2bbb14561292567136ae81e4f21e0_NeikiAnalytics.exe

  • Size

    453KB

  • MD5

    51d2bbb14561292567136ae81e4f21e0

  • SHA1

    b49a6a613493315079fc5fac74f50515ed49fc6a

  • SHA256

    3d08822a7c0b88cece35472d771ec3faf22bcdcf5262802ab41b4395773f8000

  • SHA512

    ac0eb934447eda0cca327dd9e78ad9874002ead5ab8bc6833e5decfa48c5c0def15aecd478a0ced4704fffc53beae501e52689c72d294dd3bb123a709f7a704a

  • SSDEEP

    12288:i1bU8WkzPdhcFrQb83K3jISYQpCe26EKKi:i1bUbkA5KJISYd6EKKi

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\51d2bbb14561292567136ae81e4f21e0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\51d2bbb14561292567136ae81e4f21e0_NeikiAnalytics.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\DC++ Share\jar.exe

    Filesize

    77KB

    MD5

    7b9bf3e275f7b4831415e110df9a98e4

    SHA1

    3dfa6c3a7418e081966c3c01abad0d19165a50bd

    SHA256

    e260f461ad45c75ad86dc634dd3b2e10cc712ddbc976d2f58fb642aa53315f32

    SHA512

    6a3ec033870c4390874d525fa0b099eb7410cc8ff04786b692bf7231ea84d51ef9b5069e77af270b85180aae1a737e30b52db81725270ce69dd9f3200fee6c72

  • C:\Windows\SysWOW64\xdccPrograms\7zG.exe

    Filesize

    683KB

    MD5

    630d2a96fb2c630751561d6b81f038f5

    SHA1

    fa051cdc22c504cf1363f9d18ea8212d07ba75d6

    SHA256

    9df6a3d9954aa83b1b24efa69c532cdab87346b95be71b7a7b546dbecd3d49d0

    SHA512

    6d12e1121413364ee459a6be4c0b1f4d62fa7396841583e8825bfc5669b5101b09043b4b860f3aaeadcfb90daf347e302d878378a936e99a5f5cf1b3c1a3fc8f

  • memory/548-26-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/548-27-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/548-22-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/548-23-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/548-24-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/548-25-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/548-20-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/548-21-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/548-28-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/548-31-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/548-32-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/548-68-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/548-19-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/548-149-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB