Analysis

  • max time kernel
    149s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-06-2024 06:12

General

  • Target

    64b572e5937962b05c159bbdc9c3dbb0_NeikiAnalytics.exe

  • Size

    29KB

  • MD5

    64b572e5937962b05c159bbdc9c3dbb0

  • SHA1

    ef81b2e9ad075b67b26def64c611673028b83c0d

  • SHA256

    33ffd2672082a6e60730a65db8d59ef9ae901616f8e3d3bdf67082dc95a1b5aa

  • SHA512

    d3c1bff26c4a40dec6cf5b824dba2d1fd118fdf9612e073cac117fdee7b7ff3d243e3e4d70d0fd81ba4dd0bb5aefc47ca185a48dc886d8159f4d33dcbe0ab38a

  • SSDEEP

    768:jqPJtmA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKhJJhgcI:jqGA6C1VqaqhtgVRNToV7TtRu8rM0wYf

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\64b572e5937962b05c159bbdc9c3dbb0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\64b572e5937962b05c159bbdc9c3dbb0_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2388
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2912

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    29KB

    MD5

    4b2240a92f49280b97da32a7d5593efb

    SHA1

    2eb4640af998cd5f1fd1bf146d177e2e046e1634

    SHA256

    3abe1bf3c525c83639d4a985fc1a4ae9b39c29d228d30a0970618f64e47cdb26

    SHA512

    192bfcc1c4107f832346699316f4a946b8484ec485f334104f5eef911b339431ace9740b7dad92034e75c28a7e1b2a6e02d63bc633f6902bef45facaadc682c8

  • memory/2388-3-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB

  • memory/2912-4-0x0000000000400000-0x0000000000403000-memory.dmp

    Filesize

    12KB