Analysis

  • max time kernel
    147s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-06-2024 07:38

General

  • Target

    69bd2376715fb9458a80e7e527832b00_NeikiAnalytics.exe

  • Size

    36KB

  • MD5

    69bd2376715fb9458a80e7e527832b00

  • SHA1

    17200cc250b5eef179fff58a463bfe8eb017436c

  • SHA256

    c8468234c23f6e2a7985cdb3dfda34a3f0a357f762e3e54d369f19d94fb5d7e2

  • SHA512

    964d2c3bd8cfe44f4ae7d644bb084d35b171036e9e126d9b71122f7a333837bda20ea0bca4efcf1adb81759dbede8ce17f88e6b63a8f9a8aeeebc252a54a65b2

  • SSDEEP

    384:KrxUgV8y88phTy4byzLeReRbn0BJr6OjWD3f8VsWswisr+Ht9mNKPKBnUDnrg:es18phTQi3LbjOP8maiC0fmNKPK+Drg

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Runs .reg file with regedit 1 IoCs
  • Suspicious behavior: RenamesItself 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\69bd2376715fb9458a80e7e527832b00_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\69bd2376715fb9458a80e7e527832b00_NeikiAnalytics.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:1004
    • C:\Windows\SysWOW64\regedit.exe
      regedit.exe /s C:\Users\Admin\AppData\Local\Temp\~dfds3.reg
      2⤵
      • Adds Run key to start application
      • Runs .reg file with regedit
      PID:2580

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\~dfds3.reg

    Filesize

    166B

    MD5

    f44153ef26be29552cf320325ad8b72e

    SHA1

    74ac72ba2ff0f871e59b11c95ad707372662370c

    SHA256

    767009fb8726500a4bc54b2ee744cc3ada64fdf16a44e22ff9dfe7652e2a439f

    SHA512

    1d42a4dba1d8d0df9f8fedfba384ffdbcff3103c8ba360f255b5d7e8a46128f40521e4d16cf6de04365b3b6ffad8bc681cf7042d92867ab3d912601a3d5e6e65

  • C:\Users\Admin\AppData\Local\WinHttp.exe

    Filesize

    36KB

    MD5

    04dc0697bd8b651005aaae52ded921e4

    SHA1

    baa0902ba21b7e01f75f1e7eb59308cc537d65b8

    SHA256

    3595f5be0db294b499cc348212765a02df40fd02e463344f5e8bbdb2ad58abdd

    SHA512

    6b3d002f12fdbcb6b73d16ff2bab9f19c800668c944702c4d86e55da93194ea0e0e9ea3ba0b1401cf3e03d3832bf74825233e1d40bf108ad08aed13aea6d8755

  • memory/1004-0-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/1004-10-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB