Analysis

  • max time kernel
    51s
  • max time network
    51s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-06-2024 13:38

General

  • Target

    4c276213761e704f93fcaa1c70596b50_NeikiAnalytics.exe

  • Size

    366KB

  • MD5

    4c276213761e704f93fcaa1c70596b50

  • SHA1

    360a60872c971d369815d4244391b7374f298b23

  • SHA256

    c45f88ab04fb740e7956f8d83a29f5d2c68ad9495dcba3d1102f8d91bc120448

  • SHA512

    d5721fced4504f37a905b39bf87c8515be13c4cc6944e718edd1413f1d50e4247f80bcb91be885d37c2be21aa80a4a7f3927a2e7227cf0c3ec805a5b22315885

  • SSDEEP

    3072:gVMfMIbIrw3J9Q/s8kZUBqOHHlxFT36bZohhvW18qgY+BC3K5eqU+BC3K5eqYro8:NfMmd+/stuqsHbFz6behUMwK70K7o

Malware Config

Signatures

  • Event Triggered Execution: AppInit DLLs 1 TTPs

    Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4c276213761e704f93fcaa1c70596b50_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\4c276213761e704f93fcaa1c70596b50_NeikiAnalytics.exe"
    1⤵
    • Drops file in Program Files directory
    PID:4716
  • C:\PROGRA~3\Mozilla\ywswmda.exe
    C:\PROGRA~3\Mozilla\ywswmda.exe -zhzkoil
    1⤵
    • Executes dropped EXE
    • Drops file in Program Files directory
    PID:3520

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Event Triggered Execution

1
T1546

AppInit DLLs

1
T1546.010

Privilege Escalation

Event Triggered Execution

1
T1546

AppInit DLLs

1
T1546.010

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Mozilla\ywswmda.exe
    Filesize

    366KB

    MD5

    e0d765a68ee5caa3cd2647f76259f2c9

    SHA1

    ee6e8bcc05f18ef8fb470a1485e599f34354bee0

    SHA256

    24f9ad59433ae4cf05b19f28f66a2f613578692444cff33884f58144226bda32

    SHA512

    6bbe2ac2854a0fb7e0cddc871da366bf73a7f8459021f023f3f604d7c411332e58613bb792ec76026c8708839cdc588e8b47e4d3664ec097f580b08a4471f99e