Analysis
-
max time kernel
119s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 10:59
Static task
static1
Behavioral task
behavioral1
Sample
1b373b9e57b64217b23b7ed9b20bac60_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
1b373b9e57b64217b23b7ed9b20bac60_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
1b373b9e57b64217b23b7ed9b20bac60_NeikiAnalytics.exe
-
Size
1.4MB
-
MD5
1b373b9e57b64217b23b7ed9b20bac60
-
SHA1
5d14a3abfa7809a449e9b271719fb503372561ad
-
SHA256
0d5b87c7c67ba8d886ece7df744e1a8d012345e1e336192e8c95b545dcf54292
-
SHA512
e48a82ac97973cfdfe517428f4df33ae7e8033a690363a4ea284efa04f4fa31c8bac47b743765fc5432f1552b8961f1a3f408a9ba354d0ce2d06a67e35cf0e8a
-
SSDEEP
24576:IydQ4iVx98cD6TB+1a/ZSa77sFZTDleyJohauNb0XGjm:IOpIec+F+1gFghcyJokuN4XGjm
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3032 1b373b9e57b64217b23b7ed9b20bac60_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 3032 1b373b9e57b64217b23b7ed9b20bac60_NeikiAnalytics.exe -
Loads dropped DLL 1 IoCs
pid Process 2256 1b373b9e57b64217b23b7ed9b20bac60_NeikiAnalytics.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 pastebin.com 4 pastebin.com -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3032 1b373b9e57b64217b23b7ed9b20bac60_NeikiAnalytics.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2256 1b373b9e57b64217b23b7ed9b20bac60_NeikiAnalytics.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3032 1b373b9e57b64217b23b7ed9b20bac60_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2256 wrote to memory of 3032 2256 1b373b9e57b64217b23b7ed9b20bac60_NeikiAnalytics.exe 29 PID 2256 wrote to memory of 3032 2256 1b373b9e57b64217b23b7ed9b20bac60_NeikiAnalytics.exe 29 PID 2256 wrote to memory of 3032 2256 1b373b9e57b64217b23b7ed9b20bac60_NeikiAnalytics.exe 29 PID 2256 wrote to memory of 3032 2256 1b373b9e57b64217b23b7ed9b20bac60_NeikiAnalytics.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b373b9e57b64217b23b7ed9b20bac60_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1b373b9e57b64217b23b7ed9b20bac60_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\1b373b9e57b64217b23b7ed9b20bac60_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\1b373b9e57b64217b23b7ed9b20bac60_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:3032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD551e579fe63b2b8c58c7a6506b871ada4
SHA1294d24958d1bd95d71fd82672dabb11fa5b648e4
SHA256cf925ed10ee0231b6c6f481a3aa19d0fa851fff364acff31714dbb94f37fd999
SHA512e2262188e00112c6232b3159df94bc2cf911ec56ce9981e1c2b948a283c711f448b589501a8d031a155a5a72871ab8da4f49e1e2b3b57ae44851b8c3541a934d