Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
09-05-2024 23:59
Static task
static1
Behavioral task
behavioral1
Sample
2605559e1f0c163e2414cf7eb965d0b0_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2605559e1f0c163e2414cf7eb965d0b0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
2605559e1f0c163e2414cf7eb965d0b0_NeikiAnalytics.exe
-
Size
180KB
-
MD5
2605559e1f0c163e2414cf7eb965d0b0
-
SHA1
d876618c9f1bf9c4666ff9f6f1a491487520f728
-
SHA256
0c8f51dfd58caae81a9020107236b533d5b17e741607d8368e03648d748da105
-
SHA512
0adb5a74ff7e591299837ceef19d25253a3b3c4f75be145647dd1929a1beae8cdb287523187fd91f4fe3e601e21811a304f4f48a58ce66dca63aaeaf331a0a1a
-
SSDEEP
3072:1bFZBpiJrsZnWdErsjzlp8fWrBCYQupyttsMvTrUSEJH/86DVJAkn42LHUw:1bF3pSwxraz8fGxQGMvTrPE3TJX
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2664 racmzae.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\racmzae.exe 2605559e1f0c163e2414cf7eb965d0b0_NeikiAnalytics.exe File created C:\PROGRA~3\Mozilla\ttbtowf.dll racmzae.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1728 2605559e1f0c163e2414cf7eb965d0b0_NeikiAnalytics.exe 2664 racmzae.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2592 wrote to memory of 2664 2592 taskeng.exe 29 PID 2592 wrote to memory of 2664 2592 taskeng.exe 29 PID 2592 wrote to memory of 2664 2592 taskeng.exe 29 PID 2592 wrote to memory of 2664 2592 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2605559e1f0c163e2414cf7eb965d0b0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\2605559e1f0c163e2414cf7eb965d0b0_NeikiAnalytics.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:1728
-
C:\Windows\system32\taskeng.exetaskeng.exe {9D1EE57F-530E-45DA-BE78-14560FADE3C9} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\PROGRA~3\Mozilla\racmzae.exeC:\PROGRA~3\Mozilla\racmzae.exe -cddhnyc2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD5c6c1e55739c058297b4b2b7e8a336158
SHA1b23fa87ef33e80e6fa5321ccf09cafb162296521
SHA256cd6b20a2ed04ade4ce57073c0435143f7ad2e5ded325abbf4765d452192e43f6
SHA5129133ab6a66e2324260311d307d65408d6f1343216dca7330ac0cfa876fd695286ffa668c24b8233ec3caadedb771cdbceaa0aa0a480c13ca761094beaac311b9