Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 22:27
Static task
static1
Behavioral task
behavioral1
Sample
1097c806e66bbc82fbffa44fc81f56c0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1097c806e66bbc82fbffa44fc81f56c0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
1097c806e66bbc82fbffa44fc81f56c0_NeikiAnalytics.exe
-
Size
79KB
-
MD5
1097c806e66bbc82fbffa44fc81f56c0
-
SHA1
74582f438040eab8ea132ed371bdb25eb4f8dcc7
-
SHA256
978cf744d578a68dfc2cedbb5484e848d0eeafb946a1d2dd057bd3a044aaa088
-
SHA512
a0eec3a36811bad90502d2b2a10c9a76228e6318a02ee020b96714cf96ebea9db0e204f173fcc4f3aef4dae5de113fd6a78a9f29005fc5c7c78df6f87d46383f
-
SSDEEP
1536:zvNY1FBub1Ht0OQA8AkqUhMb2nuy5wgIP0CSJ+5yPB8GMGlZ5G:zvNQFexGdqU7uy5w9WMyPN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 464 [email protected] -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2156 wrote to memory of 1220 2156 1097c806e66bbc82fbffa44fc81f56c0_NeikiAnalytics.exe 84 PID 2156 wrote to memory of 1220 2156 1097c806e66bbc82fbffa44fc81f56c0_NeikiAnalytics.exe 84 PID 2156 wrote to memory of 1220 2156 1097c806e66bbc82fbffa44fc81f56c0_NeikiAnalytics.exe 84 PID 1220 wrote to memory of 464 1220 cmd.exe 85 PID 1220 wrote to memory of 464 1220 cmd.exe 85 PID 1220 wrote to memory of 464 1220 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\1097c806e66bbc82fbffa44fc81f56c0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1097c806e66bbc82fbffa44fc81f56c0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\cmd.exePID:1220
-
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:464
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD5d6fad0fcf69df728f63e5d3add73a1ab
SHA1bf888ce376164ab6dc31cd38a3ee37d2c50a00cf
SHA2560921c7b2f07697ed79dd154b098424ccdabc3e0f2aa06947782fc03fe0aa8faa
SHA512635dd28154d580a46b46a2a9a15b786e5ee9c73293526bb33ca8c8a36a8af963d15f4c3b58c5de89dde37c286abc70edf2967437bfece6d20b04e606c00a59de