Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 21:52
Static task
static1
Behavioral task
behavioral1
Sample
07abb1c388cf9a25f74b0f243b98d700_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
07abb1c388cf9a25f74b0f243b98d700_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
07abb1c388cf9a25f74b0f243b98d700_NeikiAnalytics.exe
-
Size
6.0MB
-
MD5
07abb1c388cf9a25f74b0f243b98d700
-
SHA1
83b13a29fa36f49bba61b4b267192046a37a8da8
-
SHA256
c8814230c044c3f23deed08d051161a94e4425f3ea1a360323b67bec03fde5ef
-
SHA512
5fdb7bb54ee32ed8dc767c37f35be1230f9e090ceefc4afa952933487a3ff0969778e89fa5dade00774af1c5d9b3c4fb0eec30390dd436047e4189ce5c8a512a
-
SSDEEP
98304:emhd1Urye3WaGX9VzKV7wQqZUha5jtSyZIUS:elXW5NV+2QbaZtlir
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2820 197A.tmp -
Executes dropped EXE 1 IoCs
pid Process 2820 197A.tmp -
Loads dropped DLL 2 IoCs
pid Process 1936 07abb1c388cf9a25f74b0f243b98d700_NeikiAnalytics.exe 1936 07abb1c388cf9a25f74b0f243b98d700_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1936 wrote to memory of 2820 1936 07abb1c388cf9a25f74b0f243b98d700_NeikiAnalytics.exe 28 PID 1936 wrote to memory of 2820 1936 07abb1c388cf9a25f74b0f243b98d700_NeikiAnalytics.exe 28 PID 1936 wrote to memory of 2820 1936 07abb1c388cf9a25f74b0f243b98d700_NeikiAnalytics.exe 28 PID 1936 wrote to memory of 2820 1936 07abb1c388cf9a25f74b0f243b98d700_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\07abb1c388cf9a25f74b0f243b98d700_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\07abb1c388cf9a25f74b0f243b98d700_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\197A.tmp"C:\Users\Admin\AppData\Local\Temp\197A.tmp" --splashC:\Users\Admin\AppData\Local\Temp\07abb1c388cf9a25f74b0f243b98d700_NeikiAnalytics.exe 38FCABE6A9ED954586F8122D64E119D54DB2EE4375B5065A2B4E48FC74765802471A8A779FA4B5ECB5F974619A00262FFE7051DDCEFBD4D30B1C64BC94720D742⤵
- Deletes itself
- Executes dropped EXE
PID:2820
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.0MB
MD502dd684c4356777f5acb0645cd3d46d3
SHA14aeb56cd71a560d84d1cecb80f21a0510b83b082
SHA256a368fe56e256270dcdad26329bfab42904a86765933c8973f631a44a2c92e47a
SHA5122705daf261f4e3231f7d28ed31956af74d2ab5c849e5ca58d4b7205a85a0fe71291876f31a8f24cd2225ea49b4c7dceff7d86a9f0fb231827e483bcacff8236e