Analysis

  • max time kernel
    146s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/06/2024, 23:12

General

  • Target

    c19a10b199e208005f73d802e0deb220_NeikiAnalytics.exe

  • Size

    134KB

  • MD5

    c19a10b199e208005f73d802e0deb220

  • SHA1

    cae549bf16e2a12f8005795468356483780773d0

  • SHA256

    3c2df42a3365c68f3149bdbab58fbea432ac9a13fcf1d744bea976eea62843e4

  • SHA512

    818139e9e872e7032ed4737cfa79b49b07e41c2196693c055d08276de4868c9e0595bb98e056b0cfad57600979753d119571c259a9d661454ea817b798d43c7d

  • SSDEEP

    1536:rF0AJELopHG9aa+9qX3apJzAKWYr0v7ioy6paK2AZqMIK7aGZh38QE:riAyLN9aa+9U2rW1ip6pr2At7NZuQE

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c19a10b199e208005f73d802e0deb220_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\c19a10b199e208005f73d802e0deb220_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4848
    • C:\ProgramData\Update\WwanSvc.exe
      "C:\ProgramData\Update\WwanSvc.exe" /run
      2⤵
      • Executes dropped EXE
      PID:1120

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Update\WwanSvc.exe

    Filesize

    134KB

    MD5

    555818823f929cdf6fc3d8efda056397

    SHA1

    a8f69a58a59b70b9156de81eace7c77997232774

    SHA256

    5b78966f37d5e328304f10ae96368230cc91007ec10551bc3a091726b6d53311

    SHA512

    406a3de8f4bc194924d0d2a33b9af5dae3d147f35792aa32645a2f03a790fa1261ba96803eb1d8c05420ce5570ecf60731eead4746f8088246939fe375aa157a

  • memory/1120-6-0x0000000000840000-0x0000000000868000-memory.dmp

    Filesize

    160KB

  • memory/4848-0-0x0000000000190000-0x00000000001B8000-memory.dmp

    Filesize

    160KB

  • memory/4848-4-0x0000000000190000-0x00000000001B8000-memory.dmp

    Filesize

    160KB