Analysis

  • max time kernel
    141s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-06-2024 03:52

General

  • Target

    47f34fe1ef49f228ca718d88322358035660e40d9cff23a348c1a5582e5492a9_NeikiAnalytics.exe

  • Size

    730KB

  • MD5

    8b68b32a7f4bb7d4360ac7b7115ec900

  • SHA1

    2f6c58dc119cd2118c14d1854b9424e3e7ca1be8

  • SHA256

    47f34fe1ef49f228ca718d88322358035660e40d9cff23a348c1a5582e5492a9

  • SHA512

    a3dfa3901b96c7c518c6b1268b2ab062f5b29ff89ac40dac729cca6b9e136f540d65d8b354850f7cbc02103c3d1fdeaa0fc29b37bf21a6fb36e914e71fe1fc82

  • SSDEEP

    12288:XoxejOONAM7GUC1Jr+4o628gx2Jw+tP3Jzm8JOwHXC3X+pd167QhEQOk:4xY3NtGUmJr+4Obxd+tPZSZsiE6EhEk

Malware Config

Signatures

  • FakeAV, RogueAntivirus

    FakeAV or Rogue AntiVirus is a class of malware that displays false alert messages.

  • FakeAV payload 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\47f34fe1ef49f228ca718d88322358035660e40d9cff23a348c1a5582e5492a9_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\47f34fe1ef49f228ca718d88322358035660e40d9cff23a348c1a5582e5492a9_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    PID:3028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3028-0-0x0000000002110000-0x0000000002111000-memory.dmp

    Filesize

    4KB

  • memory/3028-5-0x0000000000400000-0x00000000004BD000-memory.dmp

    Filesize

    756KB

  • memory/3028-7-0x0000000002110000-0x0000000002111000-memory.dmp

    Filesize

    4KB