Analysis

  • max time kernel
    144s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/06/2024, 11:08

General

  • Target

    0f332c5115ff8bda5c9cb845c41e82d0_NeikiAnalytics.exe

  • Size

    480KB

  • MD5

    0f332c5115ff8bda5c9cb845c41e82d0

  • SHA1

    f26e32a127e9a671c9753fb40a92f366a716c405

  • SHA256

    2f8110e11ecdb6273cae81f49f1b4aedc5f10621397a7fa5dcd2c79e0311be49

  • SHA512

    27d10e5cf78f1e4ccf8ddbee5ce8a553f0d5a6064c3cfcbdec4ff568df3a7987d8f99f7c9782dad657eddb3025d5f875b0814b56f5e1ecbf60ba6d295f2ef536

  • SSDEEP

    6144:pjFRiOcXH6XWD0w1tizmtnktLJ6znvxNcCI+1jDIlnJ9+1aTEPTnOK4JKElDnj:nRDc3yWDNU+YUznzNjElWaT07NQtDj

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 4 IoCs
  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 13 IoCs
  • Modifies registry class 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f332c5115ff8bda5c9cb845c41e82d0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\0f332c5115ff8bda5c9cb845c41e82d0_NeikiAnalytics.exe"
    1⤵
    • Modifies firewall policy service
    • Adds policy Run key to start application
    • Sets service image path in registry
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    PID:1476
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4440 --field-trial-handle=2256,i,6670388345726423024,18382795228658886258,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:3000

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\msrpc.exe

      Filesize

      480KB

      MD5

      e36e5bd4f699240c320a1722ddf3aaec

      SHA1

      4d7c8a2d53a60937a732d7c31579bf818ecbb772

      SHA256

      71613c055e3d05a2a7df2dc62baf7fd510871f728bf0069e030cc7c5c6baed3e

      SHA512

      51d464f2bac85c285afcd442df8d1c42ded6d9dfe2d80efca64bc141a2a329b4949274862f3a6660fc51ac79c7949337ac8d06a8905480392097a0009bb5a1e1

    • memory/1476-0-0x0000000000680000-0x0000000000681000-memory.dmp

      Filesize

      4KB

    • memory/1476-1-0x0000000000400000-0x000000000047C000-memory.dmp

      Filesize

      496KB

    • memory/1476-19-0x0000000000400000-0x000000000047C000-memory.dmp

      Filesize

      496KB

    • memory/1476-20-0x0000000000400000-0x000000000047C000-memory.dmp

      Filesize

      496KB

    • memory/1476-21-0x0000000000400000-0x000000000047C000-memory.dmp

      Filesize

      496KB

    • memory/1476-22-0x0000000000400000-0x000000000047C000-memory.dmp

      Filesize

      496KB

    • memory/1476-23-0x0000000000400000-0x000000000047C000-memory.dmp

      Filesize

      496KB

    • memory/1476-24-0x0000000000400000-0x000000000047C000-memory.dmp

      Filesize

      496KB

    • memory/1476-25-0x0000000000400000-0x000000000047C000-memory.dmp

      Filesize

      496KB

    • memory/1476-26-0x0000000000400000-0x000000000047C000-memory.dmp

      Filesize

      496KB