Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 19:06
Static task
static1
Behavioral task
behavioral1
Sample
ceebec2b90dfd315fce88ceb46d4fe30_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ceebec2b90dfd315fce88ceb46d4fe30_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
ceebec2b90dfd315fce88ceb46d4fe30_NeikiAnalytics.exe
-
Size
24KB
-
MD5
ceebec2b90dfd315fce88ceb46d4fe30
-
SHA1
98ec0c7e5b660ca459830d0e3fc1edd92f1dc8d5
-
SHA256
a84d7b952f9f5fec097ae727b9867b7c2796d021dfd2e4a06ecc3b89c792851d
-
SHA512
e8dc08dc9507b702858bafebdc26bed047030be1a3c62b12cf23820c03ca28fe60c3e526dd60ec0e7f2ea6cdcd7e8bcbf169ebb36800d9bbf2e6c79897e27f59
-
SSDEEP
384:TPHWv6AMlEDPOEo6YpOELjggggggLvggggggggUaocCU+IF:TmvHfYggggggLvggggggggUaocN+IF
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1200 btkba.exe -
Loads dropped DLL 1 IoCs
pid Process 2156 ceebec2b90dfd315fce88ceb46d4fe30_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2156 wrote to memory of 1200 2156 ceebec2b90dfd315fce88ceb46d4fe30_NeikiAnalytics.exe 28 PID 2156 wrote to memory of 1200 2156 ceebec2b90dfd315fce88ceb46d4fe30_NeikiAnalytics.exe 28 PID 2156 wrote to memory of 1200 2156 ceebec2b90dfd315fce88ceb46d4fe30_NeikiAnalytics.exe 28 PID 2156 wrote to memory of 1200 2156 ceebec2b90dfd315fce88ceb46d4fe30_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ceebec2b90dfd315fce88ceb46d4fe30_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\ceebec2b90dfd315fce88ceb46d4fe30_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\btkba.exe"C:\Users\Admin\AppData\Local\Temp\btkba.exe"2⤵
- Executes dropped EXE
PID:1200
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD5f81ea200dd4a27cb109ffd48a75fd38f
SHA1c585c5e626ff4a5ac7ee9eda36b2a727dbe6b195
SHA256ae1aaff8b09d104478671967c50d574052c2bb0c296ed40b8e2b949a441c26fe
SHA512b801267deb28a1b2a157a8bb9ce38fa82aabae1489f6913c347b0660fc1b8671fa5fe711656617d958ee31440f9e16ac3e557de69a9476764702f59d5c55a39c