Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25/06/2024, 07:31

General

  • Target

    41154555eea4fdac191c934c43b1fb2d6093233bc672f66e3ba9a31c4ffa0c4d_NeikiAnalytics.exe

  • Size

    1.6MB

  • MD5

    63792dc757376ac54c2e4f69e849ab40

  • SHA1

    3a97263994a7d3adf9e46b4e08d0578f473a33bb

  • SHA256

    41154555eea4fdac191c934c43b1fb2d6093233bc672f66e3ba9a31c4ffa0c4d

  • SHA512

    5569675e5944d9c1d1998069f02c0e98721e56d638952c8e547a142127f143f998c3df01bc29c2e0254e99a237e0ca21ae8b2bea235da73cb9d0d8d886e05ea7

  • SSDEEP

    24576:yCaehx36QZvHdPnLxRYUVlqcH9TDR3GmoKeBSwyS3GS8jgNGeu8oS9YJzYF7kMVv:pr36QVBLLnPj35GLMC2jgNGZ8+JzCn

Score
10/10

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 14 IoCs
  • UPX packed file 15 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\41154555eea4fdac191c934c43b1fb2d6093233bc672f66e3ba9a31c4ffa0c4d_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\41154555eea4fdac191c934c43b1fb2d6093233bc672f66e3ba9a31c4ffa0c4d_NeikiAnalytics.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2220

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2220-0-0x000000013FB20000-0x0000000140265000-memory.dmp

          Filesize

          7.3MB

        • memory/2220-1-0x00000000000E0000-0x0000000000100000-memory.dmp

          Filesize

          128KB

        • memory/2220-3-0x0000000000440000-0x0000000000460000-memory.dmp

          Filesize

          128KB

        • memory/2220-2-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/2220-4-0x000000013FB20000-0x0000000140265000-memory.dmp

          Filesize

          7.3MB

        • memory/2220-5-0x000000013FB20000-0x0000000140265000-memory.dmp

          Filesize

          7.3MB

        • memory/2220-7-0x0000000000440000-0x0000000000460000-memory.dmp

          Filesize

          128KB

        • memory/2220-6-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/2220-8-0x000000013FB20000-0x0000000140265000-memory.dmp

          Filesize

          7.3MB

        • memory/2220-9-0x000000013FB20000-0x0000000140265000-memory.dmp

          Filesize

          7.3MB

        • memory/2220-10-0x000000013FB20000-0x0000000140265000-memory.dmp

          Filesize

          7.3MB

        • memory/2220-11-0x000000013FB20000-0x0000000140265000-memory.dmp

          Filesize

          7.3MB

        • memory/2220-12-0x000000013FB20000-0x0000000140265000-memory.dmp

          Filesize

          7.3MB

        • memory/2220-13-0x000000013FB20000-0x0000000140265000-memory.dmp

          Filesize

          7.3MB

        • memory/2220-14-0x000000013FB20000-0x0000000140265000-memory.dmp

          Filesize

          7.3MB

        • memory/2220-15-0x000000013FB20000-0x0000000140265000-memory.dmp

          Filesize

          7.3MB

        • memory/2220-16-0x000000013FB20000-0x0000000140265000-memory.dmp

          Filesize

          7.3MB

        • memory/2220-17-0x000000013FB20000-0x0000000140265000-memory.dmp

          Filesize

          7.3MB

        • memory/2220-18-0x000000013FB20000-0x0000000140265000-memory.dmp

          Filesize

          7.3MB

        • memory/2220-19-0x000000013FB20000-0x0000000140265000-memory.dmp

          Filesize

          7.3MB