Analysis

  • max time kernel
    149s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-06-2024 10:58

General

  • Target

    94641691580783920339df538b9c1f0348b0b6c3c645027dbfeda65fc5032e93_NeikiAnalytics.exe

  • Size

    78KB

  • MD5

    d741043cc701a14d3684cfd04e7f9520

  • SHA1

    f5b03a6713d006fd7b2e6d1fb8a105bf11cae829

  • SHA256

    94641691580783920339df538b9c1f0348b0b6c3c645027dbfeda65fc5032e93

  • SHA512

    0727c3798e47779d1da8d68428af7689bc0a6c19f9bb8e7177fb280b81dd944c96d32078060c75425b893acdf75b1dfe68f0a27d6ae93935948d5a1ed8115f3a

  • SSDEEP

    1536:/Ao0zj2d6rnJYulBJnDQEEa1EfBE+1EC1p1E1aE1E1EEE1+BX1EE9h1EJvY1kwvb:/AoAliulHnDQEEa1EfBE+1EC1p1E1aE6

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\94641691580783920339df538b9c1f0348b0b6c3c645027dbfeda65fc5032e93_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\94641691580783920339df538b9c1f0348b0b6c3c645027dbfeda65fc5032e93_NeikiAnalytics.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:876
    • C:\Windows\microsofthelp.exe
      "C:\Windows\microsofthelp.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Drops file in Windows directory
      PID:1936

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\microsofthelp.exe

    Filesize

    78KB

    MD5

    e361d5bdff4ff9ae7b9fd98d9198edc7

    SHA1

    67eb39115a230dbb0ddee9cf792f97ec95a52683

    SHA256

    d7a056fbc606aed8d814e96455cd5b2dd80ae83f22de6b03a0865c099e3a954b

    SHA512

    94172c5663131255269a6e3598c9f407e7286504a3c41957934cd504a765cfed49b99f9ac83335f7e3f618bef668d6cde7b8622128b4b112e2ba1d2c1ec83d39

  • memory/876-0-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB

  • memory/876-5-0x0000000000400000-0x000000000040D000-memory.dmp

    Filesize

    52KB