Analysis

  • max time kernel
    149s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    20/06/2024, 09:49

General

  • Target

    520e4ee171e49dea838c0938c1126ca45067b7091653299be2681b7a123facf2_NeikiAnalytics.exe

  • Size

    38KB

  • MD5

    344ef6742ac8a5e64337fdda0dbb2940

  • SHA1

    2d717afc3a3f027094e1574d1a0bcc56638c9934

  • SHA256

    520e4ee171e49dea838c0938c1126ca45067b7091653299be2681b7a123facf2

  • SHA512

    d2beba27f6cc702a6d0feddcb56b138593db5cae8d2dd2aff0d6701529f15261ad4252e65b1935432223f80d8ca72570be8f15fc68af866b2c16fa025fc43d8f

  • SSDEEP

    768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNhn:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYH

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\520e4ee171e49dea838c0938c1126ca45067b7091653299be2681b7a123facf2_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\520e4ee171e49dea838c0938c1126ca45067b7091653299be2681b7a123facf2_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1948
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2212

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\microsofthelp.exe

          Filesize

          38KB

          MD5

          f68e368a72535681beb6ebe020740c95

          SHA1

          2b41a8f2ae65ad01843a679a106ebd5cf668e901

          SHA256

          da4f4bc342ed8b98ce4d782b9d6a02bbcf6f52cbd2464f51efe8867380dbad03

          SHA512

          c981a44df4b40788abd0bc7855d9a74c8d87de6b1a0dfd3583a862e90a949cb02e2dd68db092210f50e56131d5a79344665594f1f54c0c90e6ad1d32bab43e59

        • memory/1948-0-0x0000000000400000-0x0000000000403000-memory.dmp

          Filesize

          12KB

        • memory/1948-3-0x00000000001B0000-0x00000000001B3000-memory.dmp

          Filesize

          12KB