Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 05:18

General

  • Target

    383d4db99ceb0a2fa11f43799476c5dd92bd21a4a3b85c0f6aa58db85cfe9ac9_NeikiAnalytics.exe

  • Size

    720KB

  • MD5

    ef3764f488b725d7665c6bdd0354be20

  • SHA1

    4d9c48bf849e41390d74db036968f3ff659031b4

  • SHA256

    383d4db99ceb0a2fa11f43799476c5dd92bd21a4a3b85c0f6aa58db85cfe9ac9

  • SHA512

    f8daf715f587c5cbdf7baa9cbd6f40ca623d396493676b61ed877107c936a4f85781cf18fc82f3c88e52198586289a01084d9dd3ac127274adcd4fc38448372a

  • SSDEEP

    12288:4jauDReWrFRoMdP4wltqA7nMlddOgH15sHQGXJ8pRPB:4DDHP427s4E1CL4

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\383d4db99ceb0a2fa11f43799476c5dd92bd21a4a3b85c0f6aa58db85cfe9ac9_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\383d4db99ceb0a2fa11f43799476c5dd92bd21a4a3b85c0f6aa58db85cfe9ac9_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1632
    • C:\ProgramData\psobb.exe
      "C:\ProgramData\psobb.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      PID:2100

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Documents and Settings .exe

    Filesize

    720KB

    MD5

    905f0f1b16084a765dfcd7a444654203

    SHA1

    f4462ad05b5aa3cd75a5f5be9802af2c850e9d06

    SHA256

    166c37f888c1879b2ea355e27878c0759b5952f48dc3b601297a4761de558cb5

    SHA512

    7c12ec3c04026410bcf5c9d1e2d3aa5ed82562c90f8b5e161dd71e7be422d4a6a9443159b5e5f7138d64f4d3e521d551bb0815044f15d1dc20b1b4f2c79020c1

  • C:\ProgramData\Saaaalamm\Mira.h

    Filesize

    136KB

    MD5

    cb4c442a26bb46671c638c794bf535af

    SHA1

    8a742d0b372f2ddd2d1fdf688c3c4ac7f9272abf

    SHA256

    f8d2c17bdf34ccfb58070ac8b131a8d95055340101a329f9a7212ac5240d0c25

    SHA512

    074a31e8da403c0a718f93cbca50574d8b658921193db0e6e20eacd232379286f14a3698cd443dc740d324ad19d74934ae001a7ad64b88897d8afefbc9a3d4e3

  • \ProgramData\psobb.exe

    Filesize

    583KB

    MD5

    03be08a694255e177643acbc6afa6e27

    SHA1

    89780e6c3b198e5f1aa4d3c3607bfe4ed51cf290

    SHA256

    faa91d0180d6de1d8095afef5c199ca64c722e05c58207a1429d083cf8272832

    SHA512

    b1efceb953e1472a159a0359011b4e9fc50eb93ebc631c1fde95cc9df93336902293a4342cab5d8676f5a783e1ba7f674a6239346cc016998861f161164534c6

  • memory/1632-0-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/1632-1-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/1632-14-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/2100-137-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB