Analysis

  • max time kernel
    51s
  • max time network
    51s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-06-2024 20:58

General

  • Target

    02d1da142850d8a3498ab6a2703e386a8a1b8386ad2c9f487f17482015c8074e_NeikiAnalytics.exe

  • Size

    7.0MB

  • MD5

    c6c1d15625dd359bda30d90f77229730

  • SHA1

    e500b051e7562ed7daf598e975a3cc53eb3e048c

  • SHA256

    02d1da142850d8a3498ab6a2703e386a8a1b8386ad2c9f487f17482015c8074e

  • SHA512

    1ba3a2450f2b46f94fd0c0b926f698da6284ebc549167696f727ab9387acdf9f74776f8acc5a91abc0da57d58705bdb02c9557356002d6f542cdb2fe722099cc

  • SSDEEP

    98304:BKP0BVz9DqrVDGYG9zWdYtgg5blzoa8kHorAa3riymKA4JrJrHv9QciYZ0MNCrGG:BKPmVz9eJPYmUb90kHC0NYJbvRCrXgaV

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\02d1da142850d8a3498ab6a2703e386a8a1b8386ad2c9f487f17482015c8074e_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\02d1da142850d8a3498ab6a2703e386a8a1b8386ad2c9f487f17482015c8074e_NeikiAnalytics.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1088
    • C:\mirxkpn.exe
      C:\mirxkpn.exe C:\Users\Admin\AppData\Local\Temp\02d1da142850d8a3498ab6a2703e386a8a1b8386ad2c9f487f17482015c8074e_NeikiAnalytics.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4572
      • C:\Users\Admin\Desktop\176¸´¹ÅС¼«Æ·.exe
        C:\Users\Admin\Desktop\176¸´¹ÅС¼«Æ·.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:3288

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Desktop\176¸´¹ÅС¼«Æ·.exe

    Filesize

    6.9MB

    MD5

    809d5ab576d38f680c072a75f2451b1d

    SHA1

    cae8d330a2992fd48eda7f22c77d0f506d7b3476

    SHA256

    2006cc931b5e063bee89d8e100e25498f7531afdeeb4116379207559091b4c37

    SHA512

    15f5c8175468bfeeb39adbdb16199203ac8c7d33fdea821da85a47fc4fdc021ad8837a3df6e8d1aef4ec11880d54fa46f3960c8fd5bd1ebe3d32ed917cebbdd7

  • C:\mirxkpn.exe

    Filesize

    7.0MB

    MD5

    c6c1d15625dd359bda30d90f77229730

    SHA1

    e500b051e7562ed7daf598e975a3cc53eb3e048c

    SHA256

    02d1da142850d8a3498ab6a2703e386a8a1b8386ad2c9f487f17482015c8074e

    SHA512

    1ba3a2450f2b46f94fd0c0b926f698da6284ebc549167696f727ab9387acdf9f74776f8acc5a91abc0da57d58705bdb02c9557356002d6f542cdb2fe722099cc

  • memory/3288-9-0x0000000010000000-0x0000000010B80000-memory.dmp

    Filesize

    11.5MB

  • memory/3288-10-0x0000000010000000-0x0000000010B80000-memory.dmp

    Filesize

    11.5MB

  • memory/3288-12-0x00000000023B0000-0x00000000023B1000-memory.dmp

    Filesize

    4KB

  • memory/3288-13-0x0000000010007000-0x0000000010008000-memory.dmp

    Filesize

    4KB

  • memory/3288-14-0x0000000010000000-0x0000000010B80000-memory.dmp

    Filesize

    11.5MB

  • memory/3288-15-0x0000000010000000-0x0000000010B80000-memory.dmp

    Filesize

    11.5MB

  • memory/3288-16-0x0000000010000000-0x0000000010B80000-memory.dmp

    Filesize

    11.5MB

  • memory/3288-17-0x00000000023B0000-0x00000000023B1000-memory.dmp

    Filesize

    4KB