Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/06/2024, 09:39

General

  • Target

    514117fd550f4d4da94d4f78eb1109a59fe7ee956ffc75a3a1a42e81d7e04274_NeikiAnalytics.exe

  • Size

    218KB

  • MD5

    7f85b1e0a0c19b3f052ece60b37e9d30

  • SHA1

    d1aff094d38f8fdb3aa195eebe1553e75ef1bb02

  • SHA256

    514117fd550f4d4da94d4f78eb1109a59fe7ee956ffc75a3a1a42e81d7e04274

  • SHA512

    e2bc8544d4bcf4e935177fe1e12d0568cc44e1509497039ffbdd93203b5f940a37eca29bffe6bf183725d5cdfbeac1dee35dd4099f008e44f5fe3e3f8aed6053

  • SSDEEP

    3072:tvm4SZsQrNzPrl6rjGMjp39d4u8iqddCxMIJOb2o5DsBPjim6hwM2H6:h1SyAJp6rjn1gOObn4b6h9h

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\514117fd550f4d4da94d4f78eb1109a59fe7ee956ffc75a3a1a42e81d7e04274_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\514117fd550f4d4da94d4f78eb1109a59fe7ee956ffc75a3a1a42e81d7e04274_NeikiAnalytics.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:4716
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • Suspicious behavior: EnumeratesProcesses
      PID:1504

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\apppatch\svchost.exe

          Filesize

          218KB

          MD5

          4987ef7ce17c445fdec3d79df9a75456

          SHA1

          2465fbc540e8dc70c352353dc90af124426fc3c7

          SHA256

          d6400668fa0ebbc033cefddd98bb9da714dd9c774a05655e6c32b9b7094ec20f

          SHA512

          e3dfa453eb2286c31c205aef1f9fbf03e2b71008977accf93e51c4d5801c2bfd5090017f4441f75c5598943b01a2b46f59aab203cb9f2acce18d744c17479ed3

        • memory/1504-17-0x0000000000400000-0x00000000005AE000-memory.dmp

          Filesize

          1.7MB

        • memory/1504-14-0x0000000000400000-0x00000000005AE000-memory.dmp

          Filesize

          1.7MB

        • memory/1504-15-0x0000000000400000-0x00000000005AE000-memory.dmp

          Filesize

          1.7MB

        • memory/1504-16-0x00000000028D0000-0x0000000002978000-memory.dmp

          Filesize

          672KB

        • memory/1504-18-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/1504-22-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/1504-20-0x0000000002D00000-0x0000000002DB6000-memory.dmp

          Filesize

          728KB

        • memory/4716-1-0x0000000000400000-0x000000000045F000-memory.dmp

          Filesize

          380KB

        • memory/4716-13-0x0000000000400000-0x000000000045F000-memory.dmp

          Filesize

          380KB

        • memory/4716-12-0x0000000000760000-0x00000000007B1000-memory.dmp

          Filesize

          324KB

        • memory/4716-11-0x0000000000400000-0x00000000005AE000-memory.dmp

          Filesize

          1.7MB

        • memory/4716-0-0x0000000000760000-0x00000000007B1000-memory.dmp

          Filesize

          324KB