Analysis
-
max time kernel
141s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 14:21
Static task
static1
Behavioral task
behavioral1
Sample
5afb9cb575dc960c36813b07ecbebab0_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5afb9cb575dc960c36813b07ecbebab0_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
5afb9cb575dc960c36813b07ecbebab0_NeikiAnalytics.exe
-
Size
73KB
-
MD5
5afb9cb575dc960c36813b07ecbebab0
-
SHA1
c2765f74449700f20e3c190aaabf0355adf6eeda
-
SHA256
93cc1929196e6ebf70ec89faafbd95ab4e6acc3428afe6b5b96e7397b4f0e349
-
SHA512
185b3387816d3d5fe9fb1f532819829b501776df084b8ab9baaa65138c4b5b82419dc87c95a5f1a9e562a2c80e83b0e88605cbd2283fbe18fbf818957309ce5e
-
SSDEEP
1536:hbB1UYK5QPqfhVWbdsmA+RjPFLC+e5hn0ZGUGf2g:hl1ZNPqfcxA+HFshnOg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1868 [email protected] -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2748 wrote to memory of 4324 2748 5afb9cb575dc960c36813b07ecbebab0_NeikiAnalytics.exe 92 PID 2748 wrote to memory of 4324 2748 5afb9cb575dc960c36813b07ecbebab0_NeikiAnalytics.exe 92 PID 2748 wrote to memory of 4324 2748 5afb9cb575dc960c36813b07ecbebab0_NeikiAnalytics.exe 92 PID 4324 wrote to memory of 1868 4324 cmd.exe 93 PID 4324 wrote to memory of 1868 4324 cmd.exe 93 PID 4324 wrote to memory of 1868 4324 cmd.exe 93 PID 1868 wrote to memory of 3412 1868 [email protected] 94 PID 1868 wrote to memory of 3412 1868 [email protected] 94 PID 1868 wrote to memory of 3412 1868 [email protected] 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\5afb9cb575dc960c36813b07ecbebab0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\5afb9cb575dc960c36813b07ecbebab0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\cmd.exePID:4324
-
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:1868
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 00.exe4⤵PID:3412
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3704 --field-trial-handle=2252,i,16022092570067181109,3235558581947505669,262144 --variations-seed-version /prefetch:81⤵PID:4660
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize73KB
MD534409ae6bf71efff2bc8e150606489b4
SHA1449def6962103758ffa844ddf7450139519ea621
SHA256efec908d7f888ac84e07f21d695bed34dbeb385f49ff6f63053e1efaeba1ea54
SHA512575b1d4a14aa10ae412106f16bf120d810670d2677ad6bd7d246984444f12cc25c74244f87c449abc4f7dbda8ee5e6cc80a21840c60e83f974cb1af0e887c9b5
-
Filesize
2KB
MD57b621943a35e7f39cf89f50cc48d7b94
SHA12858a28cf60f38025fffcd0ba2ecfec8511c197d
SHA256bef04c2f89dc115ce2763558933dba1767bf30cda6856d335ae68955923f9991
SHA5124169e664ad4e7e6891a05ceed78465e0ec44879b37fc0de97c014945e10c161f6bfb040efc24edc136e69bb115b2a1327b04cefb58141f712da856129872e8f1