Analysis
-
max time kernel
149s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 17:29
Static task
static1
Behavioral task
behavioral1
Sample
a83dbb8ac57f0e59b53153aab8385d30_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a83dbb8ac57f0e59b53153aab8385d30_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
a83dbb8ac57f0e59b53153aab8385d30_NeikiAnalytics.exe
-
Size
73KB
-
MD5
a83dbb8ac57f0e59b53153aab8385d30
-
SHA1
4788e7253be2ac6e41acf1e9ccd294ec952a00df
-
SHA256
6632524eaa4a950d343d9259b76c34005802a0c5eb1f402c955b190e14fdd227
-
SHA512
86c29dde59506a4737c8b411a39af872b5234ffe9d36c819082ec0dd60f01e013486db31ed1fe7a2754e3240e634751d0df3112eadb2ce3221b361489d31e265
-
SSDEEP
1536:1hyToPledgGkAlSt9yzkwUk6Nr5kEHIwAc:ghgRAlStYzkrJNFkEHd
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 644 oukbetear.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\oukbetear.exe a83dbb8ac57f0e59b53153aab8385d30_NeikiAnalytics.exe File created C:\Windows\SysWOW64\oukbetear.exe a83dbb8ac57f0e59b53153aab8385d30_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a83dbb8ac57f0e59b53153aab8385d30_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\a83dbb8ac57f0e59b53153aab8385d30_NeikiAnalytics.exe"1⤵
- Drops file in System32 directory
PID:3200 -
C:\Windows\SysWOW64\oukbetear.exe"C:\Windows\SysWOW64\oukbetear.exe"2⤵
- Executes dropped EXE
PID:644
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD579513d4fe1882f883b261e7fe6e69a82
SHA17cac8f65cd6f50350245398224a4ef33990f711f
SHA2568b03fb83341b1f18f40447e3ffc51b83090dcb640396a84e0e83f93e12a9b80a
SHA5120901f2ab75448058fbdcfdd321ab2b990ea57cd6b4f2677bd353e1eb1bb4933bd99a06b72e74a461ac54d24526dbb80480abd15a647666a6d8d324ea508c8b99