Analysis Overview
SHA256
276a662b33eb5a18f1964e277a0c599261268b60bfab7dbc1d6988d20e0e2dce
Threat Level: Shows suspicious behavior
The file 129416a017720ecad213d0c1c6f9def0_NeikiAnalytics was found to be: Shows suspicious behavior.
Malicious Activity Summary
Loads dropped DLL
Detects Pyinstaller
Unsigned PE
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2024-05-10 21:59
Signatures
Detects Pyinstaller
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral2
Detonation Overview
Submitted
2024-05-10 21:59
Reported
2024-05-10 22:01
Platform
win10v2004-20240508-en
Max time kernel
149s
Max time network
151s
Command Line
Signatures
Loads dropped DLL
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 3700 wrote to memory of 1560 | N/A | C:\Users\Admin\AppData\Local\Temp\129416a017720ecad213d0c1c6f9def0_NeikiAnalytics.exe | C:\Users\Admin\AppData\Local\Temp\129416a017720ecad213d0c1c6f9def0_NeikiAnalytics.exe |
| PID 3700 wrote to memory of 1560 | N/A | C:\Users\Admin\AppData\Local\Temp\129416a017720ecad213d0c1c6f9def0_NeikiAnalytics.exe | C:\Users\Admin\AppData\Local\Temp\129416a017720ecad213d0c1c6f9def0_NeikiAnalytics.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\129416a017720ecad213d0c1c6f9def0_NeikiAnalytics.exe
"C:\Users\Admin\AppData\Local\Temp\129416a017720ecad213d0c1c6f9def0_NeikiAnalytics.exe"
C:\Users\Admin\AppData\Local\Temp\129416a017720ecad213d0c1c6f9def0_NeikiAnalytics.exe
"C:\Users\Admin\AppData\Local\Temp\129416a017720ecad213d0c1c6f9def0_NeikiAnalytics.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 77.190.18.2.in-addr.arpa | udp |
| NL | 23.62.61.155:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 155.61.62.23.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.35.223.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 103.169.127.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 15.164.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 31.121.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 240.221.184.93.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 22.236.111.52.in-addr.arpa | udp |
Files
C:\Users\Admin\AppData\Local\Temp\_MEI37002\python312.dll
| MD5 | 550288a078dffc3430c08da888e70810 |
| SHA1 | 01b1d31f37fb3fd81d893cc5e4a258e976f5884f |
| SHA256 | 789a42ac160cef98f8925cb347473eeeb4e70f5513242e7faba5139ba06edf2d |
| SHA512 | 7244432fc3716f7ef27630d4e8fbc8180a2542aa97a01d44dca260ab43966dd8ac98b6023400b0478a4809aace1a128f1f4d6e544f2e591a5b436fd4c8a9d723 |
C:\Users\Admin\AppData\Local\Temp\_MEI37002\VCRUNTIME140.dll
| MD5 | be8dbe2dc77ebe7f88f910c61aec691a |
| SHA1 | a19f08bb2b1c1de5bb61daf9f2304531321e0e40 |
| SHA256 | 4d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83 |
| SHA512 | 0da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655 |
C:\Users\Admin\AppData\Local\Temp\_MEI37002\_socket.pyd
| MD5 | 9c6283cc17f9d86106b706ec4ea77356 |
| SHA1 | af4f2f52ce6122f340e5ea1f021f98b1ffd6d5b6 |
| SHA256 | 5cc62aac52edf87916deb4ebbad9abb58a6a3565b32e7544f672aca305c38027 |
| SHA512 | 11fd6f570dd78f8ff00be645e47472a96daffa3253e8bd29183bccde3f0746f7e436a106e9a68c57cc05b80a112365441d06cc719d51c906703b428a32c93124 |
C:\Users\Admin\AppData\Local\Temp\_MEI37002\select.pyd
| MD5 | 8a273f518973801f3c63d92ad726ec03 |
| SHA1 | 069fc26b9bd0f6ea3f9b3821ad7c812fd94b021f |
| SHA256 | af358285a7450de6e2e5e7ff074f964d6a257fb41d9eb750146e03c7dda503ca |
| SHA512 | 7fedae0573ecb3946ede7d0b809a98acad3d4c95d6c531a40e51a31bdb035badc9f416d8aaa26463784ff2c5e7a0cc2c793d62b5fdb2b8e9fad357f93d3a65f8 |
C:\Users\Admin\AppData\Local\Temp\_MEI37002\_bz2.pyd
| MD5 | 59d60a559c23202beb622021af29e8a9 |
| SHA1 | a405f23916833f1b882f37bdbba2dd799f93ea32 |
| SHA256 | 706d4a0c26dd454538926cbb2ff6c64257c3d9bd48c956f7cabd6def36ffd13e |
| SHA512 | 2f60e79603cf456b2a14b8254cec75ce8be0a28d55a874d4fb23d92d63bbe781ed823ab0f4d13a23dc60c4df505cbf1dbe1a0a2049b02e4bdec8d374898002b1 |
C:\Users\Admin\AppData\Local\Temp\_MEI37002\_lzma.pyd
| MD5 | b71dbe0f137ffbda6c3a89d5bcbf1017 |
| SHA1 | a2e2bdc40fdb83cc625c5b5e8a336ca3f0c29c5f |
| SHA256 | 6216173194b29875e84963cd4dc4752f7ca9493f5b1fd7e4130ca0e411c8ac6a |
| SHA512 | 9a5c7b1e25d8e1b5738f01aedfd468c1837f1ac8dd4a5b1d24ce86dcae0db1c5b20f2ff4280960bc523aee70b71db54fd515047cdaf10d21a8bec3ebd6663358 |
C:\Users\Admin\AppData\Local\Temp\_MEI37002\_hashlib.pyd
| MD5 | b0262bd89a59a3699bfa75c4dcc3ee06 |
| SHA1 | eb658849c646a26572dea7f6bfc042cb62fb49dc |
| SHA256 | 4adfbbd6366d9b55d902fc54d2b42e7c8c989a83016ed707bd7a302fc3fc7b67 |
| SHA512 | 2e4b214de3b306e3a16124af434ff8f5ab832aa3eeb1aa0aa9b49b0ada0928dcbb05c57909292fbe3b01126f4cd3fe0dac9cc15eaea5f3844d6e267865b9f7b1 |
C:\Users\Admin\AppData\Local\Temp\_MEI37002\_decimal.pyd
| MD5 | f930b7550574446a015bc602d59b0948 |
| SHA1 | 4ee6ff8019c6c540525bdd2790fc76385cdd6186 |
| SHA256 | 3b9ad1d2bc9ec03d37da86135853dac73b3fe851b164fe52265564a81eb8c544 |
| SHA512 | 10b864975945d6504433554f9ff11b47218caa00f809c6bce00f9e4089b862190a4219f659697a4ba5e5c21edbe1d8d325950921e09371acc4410469bd9189ee |
C:\Users\Admin\AppData\Local\Temp\_MEI37002\unicodedata.pyd
| MD5 | 04f35d7eec1f6b72bab9daf330fd0d6b |
| SHA1 | ecf0c25ba7adf7624109e2720f2b5930cd2dba65 |
| SHA256 | be942308d99cc954931fe6f48ed8cc7a57891ccbe99aae728121bcda1fd929ab |
| SHA512 | 3da405e4c1371f4b265e744229dcc149491a112a2b7ea8e518d5945f8c259cad15583f25592b35ec8a344e43007ae00da9673822635ee734d32664f65c9c8d9b |
C:\Users\Admin\AppData\Local\Temp\_MEI37002\libcrypto-3.dll
| MD5 | e547cf6d296a88f5b1c352c116df7c0c |
| SHA1 | cafa14e0367f7c13ad140fd556f10f320a039783 |
| SHA256 | 05fe080eab7fc535c51e10c1bd76a2f3e6217f9c91a25034774588881c3f99de |
| SHA512 | 9f42edf04c7af350a00fa4fdf92b8e2e6f47ab9d2d41491985b20cd0adde4f694253399f6a88f4bdd765c4f49792f25fb01e84ec03fd5d0be8bb61773d77d74d |
C:\Users\Admin\AppData\Local\Temp\_MEI37002\base_library.zip
| MD5 | 630153ac2b37b16b8c5b0dbb69a3b9d6 |
| SHA1 | f901cd701fe081489b45d18157b4a15c83943d9d |
| SHA256 | ec4e6b8e9f6f1f4b525af72d3a6827807c7a81978cb03db5767028ebea283be2 |
| SHA512 | 7e3a434c8df80d32e66036d831cbd6661641c0898bd0838a07038b460261bf25b72a626def06d0faa692caf64412ca699b1fa7a848fe9d969756e097cba39e41 |
Analysis: behavioral1
Detonation Overview
Submitted
2024-05-10 21:59
Reported
2024-05-10 22:01
Platform
win7-20240508-en
Max time kernel
122s
Max time network
124s
Command Line
Signatures
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\129416a017720ecad213d0c1c6f9def0_NeikiAnalytics.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2424 wrote to memory of 2992 | N/A | C:\Users\Admin\AppData\Local\Temp\129416a017720ecad213d0c1c6f9def0_NeikiAnalytics.exe | C:\Users\Admin\AppData\Local\Temp\129416a017720ecad213d0c1c6f9def0_NeikiAnalytics.exe |
| PID 2424 wrote to memory of 2992 | N/A | C:\Users\Admin\AppData\Local\Temp\129416a017720ecad213d0c1c6f9def0_NeikiAnalytics.exe | C:\Users\Admin\AppData\Local\Temp\129416a017720ecad213d0c1c6f9def0_NeikiAnalytics.exe |
| PID 2424 wrote to memory of 2992 | N/A | C:\Users\Admin\AppData\Local\Temp\129416a017720ecad213d0c1c6f9def0_NeikiAnalytics.exe | C:\Users\Admin\AppData\Local\Temp\129416a017720ecad213d0c1c6f9def0_NeikiAnalytics.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\129416a017720ecad213d0c1c6f9def0_NeikiAnalytics.exe
"C:\Users\Admin\AppData\Local\Temp\129416a017720ecad213d0c1c6f9def0_NeikiAnalytics.exe"
C:\Users\Admin\AppData\Local\Temp\129416a017720ecad213d0c1c6f9def0_NeikiAnalytics.exe
"C:\Users\Admin\AppData\Local\Temp\129416a017720ecad213d0c1c6f9def0_NeikiAnalytics.exe"
Network
Files
C:\Users\Admin\AppData\Local\Temp\_MEI24242\python312.dll
| MD5 | 550288a078dffc3430c08da888e70810 |
| SHA1 | 01b1d31f37fb3fd81d893cc5e4a258e976f5884f |
| SHA256 | 789a42ac160cef98f8925cb347473eeeb4e70f5513242e7faba5139ba06edf2d |
| SHA512 | 7244432fc3716f7ef27630d4e8fbc8180a2542aa97a01d44dca260ab43966dd8ac98b6023400b0478a4809aace1a128f1f4d6e544f2e591a5b436fd4c8a9d723 |