Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
09-05-2024 19:58
Behavioral task
behavioral1
Sample
e372907a07955ec7f1b11fa741f040b0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
e372907a07955ec7f1b11fa741f040b0_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
e372907a07955ec7f1b11fa741f040b0_NeikiAnalytics.exe
-
Size
190KB
-
MD5
e372907a07955ec7f1b11fa741f040b0
-
SHA1
1ba1dfff2279ab148e3af687632e317b4e97a84c
-
SHA256
7869924b70ca08c287cccb42d2842496881e08a8145797422beac93c37062781
-
SHA512
6551d7ba9d76efb924ef2f5df634dabe9a74f4439ae6fd724a6b87a3cdc027271ea3f0782835f9f3f6eede8069f17492bef7f8c3d29dc5e4c5d0275376900ad2
-
SSDEEP
3072:rYubs4vIPfIOKyCRfyJiJJMXybJg30TZZ+MbpqdNjfBDckH8sbigzwQjoE:Euk6fK6tixMbwNL+kDr/
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
resource yara_rule behavioral1/files/0x0036000000014335-7.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 2648 zketugg.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\zketugg.exe e372907a07955ec7f1b11fa741f040b0_NeikiAnalytics.exe File created C:\PROGRA~3\Mozilla\hbibisc.dll zketugg.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2084 e372907a07955ec7f1b11fa741f040b0_NeikiAnalytics.exe 2648 zketugg.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2328 wrote to memory of 2648 2328 taskeng.exe 29 PID 2328 wrote to memory of 2648 2328 taskeng.exe 29 PID 2328 wrote to memory of 2648 2328 taskeng.exe 29 PID 2328 wrote to memory of 2648 2328 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\e372907a07955ec7f1b11fa741f040b0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\e372907a07955ec7f1b11fa741f040b0_NeikiAnalytics.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2084
-
C:\Windows\system32\taskeng.exetaskeng.exe {6844D8C0-C6CA-4037-9661-8D81D3CB79ED} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\PROGRA~3\Mozilla\zketugg.exeC:\PROGRA~3\Mozilla\zketugg.exe -bsvwzxb2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2648
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
190KB
MD57110d383f318860ae007024787220467
SHA1c6bb9c0021efd292ae7a3ee124a3ccf0e0ea26d8
SHA2567c9aba4658d08adeb717977d45c45919fed405e72766731a89232dd06d865308
SHA51268c8423cec492da198823aaf999c47610ca5596935778210c60f965ad29fe6cc618999eba0e098f16d32607bad790c25a47bbc0fca721972f95a8d20ca146ecc