Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/06/2024, 23:55

General

  • Target

    357e826628e7ff17de461568dd5e589d6c7f44b77ea218f92b100a23aca1cf1b_NeikiAnalytics.exe

  • Size

    688KB

  • MD5

    71085241bc90a1b54107e258884b26b0

  • SHA1

    866142121778ed0e6ae44c0563e6c4b14ce024d5

  • SHA256

    357e826628e7ff17de461568dd5e589d6c7f44b77ea218f92b100a23aca1cf1b

  • SHA512

    f69de7ebd6184f2eeb883b9e73a762d6c952daa3a345387775fdf2fdef04b00c59d738df671ae7a33c4f68792db490efbbfd511bf47930087e14c24da5ea2328

  • SSDEEP

    12288:S1/aGLDCMNpNAkoSzZWD8ayX2MQCw7D0n5wdov5RNC2TSDS0YnZRZQsQG2n7Y:S1/aGLDCM4D8ayGMLqdov5RNC2TSDS0K

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\357e826628e7ff17de461568dd5e589d6c7f44b77ea218f92b100a23aca1cf1b_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\357e826628e7ff17de461568dd5e589d6c7f44b77ea218f92b100a23aca1cf1b_NeikiAnalytics.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2044
    • C:\ProgramData\vgejy.exe
      "C:\ProgramData\vgejy.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:3008
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1308,i,3144109701624127473,12586215149656995128,262144 --variations-seed-version --mojo-platform-channel-handle=4240 /prefetch:8
    1⤵
      PID:2408

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Documents and Settings .exe

            Filesize

            688KB

            MD5

            8942eb55d157757e6d2c13e26643678a

            SHA1

            a2f771e2a5a9a3ff3b65996f33cad8ce61319954

            SHA256

            a753c06c18d02f8c1914f15894eea2ba7109f77cec9eba0602c15906ce617bb9

            SHA512

            d90484289d0dbb3e8eea376630b7c7dbae3dac04bce66f1e7559d74eac29b9316cc869b316ec4436a0fc7ec99c2badee52c886b6337b239f8806a100f5a1773b

          • C:\ProgramData\Saaaalamm\Mira.h

            Filesize

            269KB

            MD5

            ca9dfac0aff393d7ad3732c18bf722be

            SHA1

            0bbb7be6293e7fd953293d9e7d5ad0cbfbc81e75

            SHA256

            dc2214022e8be1e51c69f9554ad5e5da74e9a9f7ec8fd2f08b3e5c9f0bb01423

            SHA512

            85d4e203983608671fdeb61cdc7e6bd79389001a4c427f1d473de5298a737e65c6f0c6f1243a64b5608349684a180c79516519632beb33a67b44ff3e446d75c3

          • C:\ProgramData\vgejy.exe

            Filesize

            418KB

            MD5

            f7b7d709ea7ccb6b809ebeeea30d6c52

            SHA1

            062438bb6560b542a29a886f8344c4678d40fcc2

            SHA256

            1acfdc079f779c07ef8769ae56f5e4882088d9492958724fd94630d0cc738957

            SHA512

            55bae64b38567f8119ec06caf961e04208deafd1ab879a494e0b2b68271d8e616cf7b8f353bc95ee3c283cfa365c975330fc7106d280b70c632227e20e06dfb0

          • memory/2044-0-0x0000000000400000-0x000000000045F000-memory.dmp

            Filesize

            380KB

          • memory/2044-8-0x0000000000400000-0x000000000045F000-memory.dmp

            Filesize

            380KB

          • memory/3008-134-0x0000000000400000-0x0000000000448000-memory.dmp

            Filesize

            288KB