Analysis

  • max time kernel
    120s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    11/06/2024, 22:01

General

  • Target

    06f72979548a1345e8f8ea4f2886f720_NeikiAnalytics.exe

  • Size

    134KB

  • MD5

    06f72979548a1345e8f8ea4f2886f720

  • SHA1

    cc5c4e2e60b129f9c788e1fbb6e087bf57314df0

  • SHA256

    c2128d4b2c7d8e7a1dd2cc3230dd1829022f80de7e2079145a466c675d143b6f

  • SHA512

    e5b38a5211125f2ada291457e9d48939840492b619e0ad64ebb54f7cadd9a0a26de0f5eb00521f37915972fd9dfda772d7f90bcc78ea9a0e50b667ec3fc59dd1

  • SSDEEP

    1536:rF0AJELopHG9aa+9qX3apJzAKWYr0v7ioy6paK2AZqMIK7aGZh38QR:riAyLN9aa+9U2rW1ip6pr2At7NZuQR

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06f72979548a1345e8f8ea4f2886f720_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\06f72979548a1345e8f8ea4f2886f720_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1284
    • C:\ProgramData\Update\WwanSvc.exe
      "C:\ProgramData\Update\WwanSvc.exe" /run
      2⤵
      • Executes dropped EXE
      PID:2356

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \ProgramData\Update\WwanSvc.exe

    Filesize

    134KB

    MD5

    774d1a1cb4667068fa41127f70022749

    SHA1

    1d1890b04afb11998146d1b89c486bfaaf93b99f

    SHA256

    326f1e8e5df5af41398f631440caeaf5708901b6e3f680fffeca4c53c2e419bc

    SHA512

    25de1d498c379dbf00bfc53963f2bd8428c4e8f5c880503321e44316c7fa4d52aecc06efe21d1c40a73a26d13d9f52c46fb606f2ec236e4ad6ed0f0e4c632ea0

  • memory/1284-1-0x00000000011A0000-0x00000000011C8000-memory.dmp

    Filesize

    160KB

  • memory/1284-4-0x0000000000120000-0x0000000000148000-memory.dmp

    Filesize

    160KB

  • memory/1284-8-0x0000000000120000-0x0000000000148000-memory.dmp

    Filesize

    160KB

  • memory/1284-9-0x00000000011A0000-0x00000000011C8000-memory.dmp

    Filesize

    160KB

  • memory/2356-7-0x00000000012B0000-0x00000000012D8000-memory.dmp

    Filesize

    160KB