Analysis
-
max time kernel
92s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
08/06/2024, 15:45
Behavioral task
behavioral1
Sample
b4b737a8b5769768f731f0f7f7532dc0_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
b4b737a8b5769768f731f0f7f7532dc0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
b4b737a8b5769768f731f0f7f7532dc0_NeikiAnalytics.exe
-
Size
134KB
-
MD5
b4b737a8b5769768f731f0f7f7532dc0
-
SHA1
569b5d74e71aeb346af6c9b5d641646a53e98a11
-
SHA256
4f933aabb0ed1b5c7452d42845fdb7cec13614d2a1fc0a4d21f52ef6f1fbca1b
-
SHA512
2e985db90ba58442e48f8c223a332a9f196f99dd973d439df0708de8c675903dc076b4f7c43178d7fad45ae2d06610ab6662c7361e4b6c929379fbc60588e619
-
SSDEEP
1536:rF0AJELopHG9aa+9qX3apJzAKWYr0v7ioy6paK2AZqMIK7aGZh38Qj:riAyLN9aa+9U2rW1ip6pr2At7NZuQj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4708 WwanSvc.exe -
resource yara_rule behavioral2/memory/3804-0-0x0000000000040000-0x0000000000068000-memory.dmp upx behavioral2/files/0x0008000000023420-3.dat upx behavioral2/memory/4708-6-0x0000000000590000-0x00000000005B8000-memory.dmp upx behavioral2/memory/3804-5-0x0000000000040000-0x0000000000068000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\WwanSvc.exe\" /run" b4b737a8b5769768f731f0f7f7532dc0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3804 wrote to memory of 4708 3804 b4b737a8b5769768f731f0f7f7532dc0_NeikiAnalytics.exe 81 PID 3804 wrote to memory of 4708 3804 b4b737a8b5769768f731f0f7f7532dc0_NeikiAnalytics.exe 81 PID 3804 wrote to memory of 4708 3804 b4b737a8b5769768f731f0f7f7532dc0_NeikiAnalytics.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4b737a8b5769768f731f0f7f7532dc0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\b4b737a8b5769768f731f0f7f7532dc0_NeikiAnalytics.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\ProgramData\Update\WwanSvc.exe"C:\ProgramData\Update\WwanSvc.exe" /run2⤵
- Executes dropped EXE
PID:4708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD51f7dad05812deb1c0c5c254bf6f29b0f
SHA1995be995004c3ce3a4b5682f7f107c550d689b32
SHA256b271cb7e3c6e8caa9442ff5a00707b6eb0a0d91a487cabdcaf00e80725e4ceea
SHA5124e4ff9bb7213871b4b73b9f0a329f2b4d93104a3f7a40c5f5b4b3e5a5167853edd5322bec5273d157195f6620e7c7ab706094e82de06a2a5b042b7efde398416