Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    09/05/2024, 21:52

General

  • Target

    07abb1c388cf9a25f74b0f243b98d700_NeikiAnalytics.exe

  • Size

    6.0MB

  • MD5

    07abb1c388cf9a25f74b0f243b98d700

  • SHA1

    83b13a29fa36f49bba61b4b267192046a37a8da8

  • SHA256

    c8814230c044c3f23deed08d051161a94e4425f3ea1a360323b67bec03fde5ef

  • SHA512

    5fdb7bb54ee32ed8dc767c37f35be1230f9e090ceefc4afa952933487a3ff0969778e89fa5dade00774af1c5d9b3c4fb0eec30390dd436047e4189ce5c8a512a

  • SSDEEP

    98304:emhd1Urye3WaGX9VzKV7wQqZUha5jtSyZIUS:elXW5NV+2QbaZtlir

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\07abb1c388cf9a25f74b0f243b98d700_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\07abb1c388cf9a25f74b0f243b98d700_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1936
    • C:\Users\Admin\AppData\Local\Temp\197A.tmp
      "C:\Users\Admin\AppData\Local\Temp\197A.tmp" --splashC:\Users\Admin\AppData\Local\Temp\07abb1c388cf9a25f74b0f243b98d700_NeikiAnalytics.exe 38FCABE6A9ED954586F8122D64E119D54DB2EE4375B5065A2B4E48FC74765802471A8A779FA4B5ECB5F974619A00262FFE7051DDCEFBD4D30B1C64BC94720D74
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2820

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\197A.tmp

    Filesize

    6.0MB

    MD5

    02dd684c4356777f5acb0645cd3d46d3

    SHA1

    4aeb56cd71a560d84d1cecb80f21a0510b83b082

    SHA256

    a368fe56e256270dcdad26329bfab42904a86765933c8973f631a44a2c92e47a

    SHA512

    2705daf261f4e3231f7d28ed31956af74d2ab5c849e5ca58d4b7205a85a0fe71291876f31a8f24cd2225ea49b4c7dceff7d86a9f0fb231827e483bcacff8236e

  • memory/1936-0-0x0000000000400000-0x0000000000849000-memory.dmp

    Filesize

    4.3MB

  • memory/2820-9-0x0000000000400000-0x0000000000849000-memory.dmp

    Filesize

    4.3MB