Analysis

  • max time kernel
    151s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-06-2024 06:39

General

  • Target

    3bbd3f80dec9b69018c9a0edce4c6734c787e570debfd1c6eac5c3adb059355b_NeikiAnalytics.exe

  • Size

    36KB

  • MD5

    715beb2919894e0395abbe691057dcd0

  • SHA1

    cb2b19831357f481d14d633cdcba17a7ab0a0576

  • SHA256

    3bbd3f80dec9b69018c9a0edce4c6734c787e570debfd1c6eac5c3adb059355b

  • SHA512

    3d345a102b98bffeca3283961cdc96749fad7f9a2da4992b48071602ee937b0c43759540b6c629158e29cf6f2bf39631b8bdc494ef025db42c83a9bbdcb05d7c

  • SSDEEP

    768:DqPJtsA6C1VqahohtgVRNToV7TtRu8rM0wYVFl2g5coW58dO0xXHV2EfKYfdhNh:DqMA6C1VqaqhtgVRNToV7TtRu8rM0wYg

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3bbd3f80dec9b69018c9a0edce4c6734c787e570debfd1c6eac5c3adb059355b_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\3bbd3f80dec9b69018c9a0edce4c6734c787e570debfd1c6eac5c3adb059355b_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2472
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:4184
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3968 --field-trial-handle=2900,i,14549994492153927475,12895178890800740987,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4240

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\microsofthelp.exe

      Filesize

      36KB

      MD5

      bbd88cdc1e4d39a3351b9da2dd434626

      SHA1

      b0e6250452952e1fd66680c9c90f32ee19629cdc

      SHA256

      00b05e82b183ba6e09a1aee8426856bbf4de82c8541faf70e2d4e32538f02dc4

      SHA512

      e8357a8c56cf9d7dde03edf44fbab1e2f0144840501dfb6b1f599c5d8d8046b240bf0103610bdc0793365e9384690f6abe6f3b01bf1a0421d5a54e26ee8130ae

    • memory/2472-0-0x0000000000400000-0x0000000000403000-memory.dmp

      Filesize

      12KB

    • memory/2472-5-0x0000000000400000-0x0000000000403000-memory.dmp

      Filesize

      12KB

    • memory/4184-6-0x0000000000400000-0x0000000000403000-memory.dmp

      Filesize

      12KB