Analysis

  • max time kernel
    145s
  • max time network
    52s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/06/2024, 08:04

General

  • Target

    44d06f25616c75f9b4bbc69ddae64afc726fa5f786ca8fc0520bab5452c6c8f1_NeikiAnalytics.exe

  • Size

    134KB

  • MD5

    64ba68f533f7b0bc5f2b74397f507150

  • SHA1

    37e2558794f5c146fa05520fd19d76690fb9781b

  • SHA256

    44d06f25616c75f9b4bbc69ddae64afc726fa5f786ca8fc0520bab5452c6c8f1

  • SHA512

    8828f0e186b811316efad0d5d27ed8fdcd1fab4d6163b96654f2dd3dc5d91011f2870e18adc937cf5c32be2bf2e909e663427dc83d4f839102c965ab07179e59

  • SSDEEP

    1536:rF0AJELopHG9aa+9qX3apJzAKWYr0v7ioy6paK2AZqMIK7aGZh38Qs:riAyLN9aa+9U2rW1ip6pr2At7NZuQs

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\44d06f25616c75f9b4bbc69ddae64afc726fa5f786ca8fc0520bab5452c6c8f1_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\44d06f25616c75f9b4bbc69ddae64afc726fa5f786ca8fc0520bab5452c6c8f1_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2352
    • C:\ProgramData\Update\WwanSvc.exe
      "C:\ProgramData\Update\WwanSvc.exe" /run
      2⤵
      • Executes dropped EXE
      PID:1156

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Update\WwanSvc.exe

    Filesize

    134KB

    MD5

    32304a37abe10408d81a258db9c7bc13

    SHA1

    09a5141f62494f290e2dd2c173e5a9fc9ce9f9ad

    SHA256

    24269820317079f02c64080eb0efd4e5d3f5b02805c8d81dec0eb14829461e88

    SHA512

    ae1a9587afe31befe9e90fc80664d3f1de9d12b7d60ccf5bbfd9d8f7f91d92f2c63c07cfdc0b87d3aba10a704229ff92569961f3c210ee8fd21e0c392a9a03b0

  • memory/1156-6-0x0000000000020000-0x0000000000048000-memory.dmp

    Filesize

    160KB

  • memory/1156-7-0x0000000000020000-0x0000000000048000-memory.dmp

    Filesize

    160KB

  • memory/2352-0-0x0000000000760000-0x0000000000788000-memory.dmp

    Filesize

    160KB

  • memory/2352-4-0x0000000000760000-0x0000000000788000-memory.dmp

    Filesize

    160KB