Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-06-2024 17:55

General

  • Target

    a43ce41a5bbd845b0a6499e2d7dd27aeb10d2013f6749a39ac97d5289762ac6f_NeikiAnalytics.exe

  • Size

    479KB

  • MD5

    bf46aa5d7cc0b1cabac6a2c8037b95c0

  • SHA1

    5d2ab292ae3c785053f348dfa087577e05cf366b

  • SHA256

    a43ce41a5bbd845b0a6499e2d7dd27aeb10d2013f6749a39ac97d5289762ac6f

  • SHA512

    1f86eac6d7962061615ac905e8063431ea047edd67c5293a7ca5d07cc266eabfc5f1d1110fca0e54c36054b8742820312cd2724e767b7009b023fb58c7787953

  • SSDEEP

    12288:+hlc87eqqV5e+wBV6O+3ocJUgi+N1Akzvojq8hxcsqK:+hSqqHeVBxcocJUZ+NuIQPxbqK

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of UnmapMainImage
    PID:3384
    • C:\Users\Admin\AppData\Local\Temp\a43ce41a5bbd845b0a6499e2d7dd27aeb10d2013f6749a39ac97d5289762ac6f_NeikiAnalytics.exe
      "C:\Users\Admin\AppData\Local\Temp\a43ce41a5bbd845b0a6499e2d7dd27aeb10d2013f6749a39ac97d5289762ac6f_NeikiAnalytics.exe"
      2⤵
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:864
      • C:\Users\Admin\AppData\Roaming\fsqunApp\fonttugc.exe
        "C:\Users\Admin\AppData\Roaming\fsqunApp"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3116
        • C:\Users\Admin\AppData\Local\Temp\~B75.tmp
          3384 490504 3116 1
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2372
  • C:\Windows\SysWOW64\dvdpsc.exe
    C:\Windows\SysWOW64\dvdpsc.exe -s
    1⤵
    • Executes dropped EXE
    PID:536
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5004 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:1968

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\~B75.tmp

      Filesize

      8KB

      MD5

      86dc243576cf5c7445451af37631eea9

      SHA1

      99a81c47c4c02f32c0ab456bfa23c306c7a09bf9

      SHA256

      25d2a671e1b5b5b95697ac0234ce4d46e0d0894919521b54aabebd9daecf994a

      SHA512

      c7310524f9b65f811146c1eb6ae944966351ac88a95fbc1ac422d8810730e5e212a7e28090ad758ea23c96ba38073e7fcf42460575e7f09dbc759a45c5d5a4a4

    • C:\Users\Admin\AppData\Roaming\fsqunApp\fonttugc.exe

      Filesize

      479KB

      MD5

      b9779c3f2c69a8ffc22b6613fb96ab24

      SHA1

      7fd3e7f11406f22040cc65b8191ade4d24258fcf

      SHA256

      60ec5d945024bab70e6f16d0abd9bd9c0f11a29b56314733d4d6d64508d2530b

      SHA512

      9ac77c158373727ef76c2669cba41050093e8a0e8a22d5038585253c0b3646a09f123e0733bdbba3bbf9230a1f41fc0f02246caf19e637cffec1f12ca5ec5bfd

    • memory/536-13-0x0000000000560000-0x00000000005E0000-memory.dmp

      Filesize

      512KB

    • memory/536-17-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/864-18-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/864-1-0x00000000004F0000-0x0000000000570000-memory.dmp

      Filesize

      512KB

    • memory/864-0-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/3116-7-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/3116-8-0x00000000005E0000-0x0000000000660000-memory.dmp

      Filesize

      512KB

    • memory/3116-12-0x00000000005C0000-0x00000000005C5000-memory.dmp

      Filesize

      20KB

    • memory/3116-29-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/3384-26-0x0000000002710000-0x0000000002797000-memory.dmp

      Filesize

      540KB

    • memory/3384-27-0x0000000000850000-0x0000000000856000-memory.dmp

      Filesize

      24KB

    • memory/3384-28-0x00000000008B0000-0x00000000008BD000-memory.dmp

      Filesize

      52KB

    • memory/3384-19-0x0000000002710000-0x0000000002797000-memory.dmp

      Filesize

      540KB