Analysis
-
max time kernel
147s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 05:18
Static task
static1
Behavioral task
behavioral1
Sample
383d4db99ceb0a2fa11f43799476c5dd92bd21a4a3b85c0f6aa58db85cfe9ac9_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
383d4db99ceb0a2fa11f43799476c5dd92bd21a4a3b85c0f6aa58db85cfe9ac9_NeikiAnalytics.exe
Resource
win10v2004-20240611-en
General
-
Target
383d4db99ceb0a2fa11f43799476c5dd92bd21a4a3b85c0f6aa58db85cfe9ac9_NeikiAnalytics.exe
-
Size
720KB
-
MD5
ef3764f488b725d7665c6bdd0354be20
-
SHA1
4d9c48bf849e41390d74db036968f3ff659031b4
-
SHA256
383d4db99ceb0a2fa11f43799476c5dd92bd21a4a3b85c0f6aa58db85cfe9ac9
-
SHA512
f8daf715f587c5cbdf7baa9cbd6f40ca623d396493676b61ed877107c936a4f85781cf18fc82f3c88e52198586289a01084d9dd3ac127274adcd4fc38448372a
-
SSDEEP
12288:4jauDReWrFRoMdP4wltqA7nMlddOgH15sHQGXJ8pRPB:4DDHP427s4E1CL4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3976 skfmf.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\skfmf.exe" skfmf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4420 wrote to memory of 3976 4420 383d4db99ceb0a2fa11f43799476c5dd92bd21a4a3b85c0f6aa58db85cfe9ac9_NeikiAnalytics.exe 87 PID 4420 wrote to memory of 3976 4420 383d4db99ceb0a2fa11f43799476c5dd92bd21a4a3b85c0f6aa58db85cfe9ac9_NeikiAnalytics.exe 87 PID 4420 wrote to memory of 3976 4420 383d4db99ceb0a2fa11f43799476c5dd92bd21a4a3b85c0f6aa58db85cfe9ac9_NeikiAnalytics.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\383d4db99ceb0a2fa11f43799476c5dd92bd21a4a3b85c0f6aa58db85cfe9ac9_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\383d4db99ceb0a2fa11f43799476c5dd92bd21a4a3b85c0f6aa58db85cfe9ac9_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\ProgramData\skfmf.exe"C:\ProgramData\skfmf.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
720KB
MD54581e52f1d0d83669078ac5d0cceb5a3
SHA16deef010cefcdb6701880375b96de7da5b0c42bf
SHA25644923df98bf39e5bc2f90072123fbf90c1d192e8190bfa34318cd66c6db83661
SHA512671d071767ed5555e394507b5ddcdd38d4cea7af4f43523ee3a0fa505d63cb6999a9e0b6486d0b57ac113720a4c76609641db237bcf1ab7e5fece56e5ef1bb2e
-
Filesize
136KB
MD5cb4c442a26bb46671c638c794bf535af
SHA18a742d0b372f2ddd2d1fdf688c3c4ac7f9272abf
SHA256f8d2c17bdf34ccfb58070ac8b131a8d95055340101a329f9a7212ac5240d0c25
SHA512074a31e8da403c0a718f93cbca50574d8b658921193db0e6e20eacd232379286f14a3698cd443dc740d324ad19d74934ae001a7ad64b88897d8afefbc9a3d4e3
-
Filesize
583KB
MD503be08a694255e177643acbc6afa6e27
SHA189780e6c3b198e5f1aa4d3c3607bfe4ed51cf290
SHA256faa91d0180d6de1d8095afef5c199ca64c722e05c58207a1429d083cf8272832
SHA512b1efceb953e1472a159a0359011b4e9fc50eb93ebc631c1fde95cc9df93336902293a4342cab5d8676f5a783e1ba7f674a6239346cc016998861f161164534c6