Analysis

  • max time kernel
    149s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/06/2024, 14:20

General

  • Target

    6081e8b2e66f5d4f6cd1746271891140_NeikiAnalytics.exe

  • Size

    89KB

  • MD5

    6081e8b2e66f5d4f6cd1746271891140

  • SHA1

    ab12d6c4029b71b74eb37e516c3bace414a0b2bc

  • SHA256

    ec61db6438b289156c82b0f1216273f8c85ce2fc2d42f8fc8ea99f108a1e61db

  • SHA512

    f3a5a2807374e52c3ad57edd6818478ce3b0e84996d9689e4c0c367dea69e4365b0852cf49caa4304449d8fa0b03001d3827d07569823627eb2a8d2261c06000

  • SSDEEP

    1536:JaiqH1s+kCtrA2UMT0mTFibDKa1XE2DjBOhcAFkHd963LiVBSsge:w1B31bdBob2QX/4KAF2d2O

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6081e8b2e66f5d4f6cd1746271891140_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\6081e8b2e66f5d4f6cd1746271891140_NeikiAnalytics.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:424

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\DC++ Share\jarsigner.exe

          Filesize

          63KB

          MD5

          9abdbe687be8e7069c43b89e37676049

          SHA1

          06566dbdaed6a21ee85274467917d7088e0e9884

          SHA256

          5c9bb94c12710a5f13ba8943cde2507802902b5b77218564af0ba86405fddd2a

          SHA512

          aff7604da61ef2bd7692979ca3e7eca0e00d211bba17a5f6b324110bfa4adcb470a222a4c50a57d2415d7ff436c0db6052a4c096f9e10a8ccb7da7feab907844

        • C:\Windows\SysWOW64\xdccPrograms\7zG.exe

          Filesize

          683KB

          MD5

          8233ff2e0c63485b6650b71f991ec5bb

          SHA1

          f9809b81535d9afc935e590d9d5a57c46635dc71

          SHA256

          c18da79baf9ac9a8ee6e5dbc9dfac30260cdc7fc826c437a8e571e7c1c9612e6

          SHA512

          1f2a18e5caa095d1c7397dea5b903a8d5dfed09d8af5279c62d1ce37697b79b8b53afcbd3b33224d97580ae786004c9a2875bbf55f9f89b004fabfa7a378b907

        • memory/424-24-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/424-25-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/424-20-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/424-21-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/424-22-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/424-23-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/424-18-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/424-19-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/424-26-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/424-28-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/424-29-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/424-51-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/424-57-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/424-17-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB