Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
10-05-2024 02:43
Static task
static1
Behavioral task
behavioral1
Sample
5121870bfc3d8eea5e307fed21f15570_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
5121870bfc3d8eea5e307fed21f15570_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
5121870bfc3d8eea5e307fed21f15570_NeikiAnalytics.exe
-
Size
262KB
-
MD5
5121870bfc3d8eea5e307fed21f15570
-
SHA1
14a8835dfa22c005cd211ebf0f62458b2e9769b0
-
SHA256
dead789596c95f57499e9da1fa130cbaf453a32e4c2368e72eee6e7fcdfad330
-
SHA512
b0caa0265b9fc4f91c08bbf3c1132df65fe688063b5213501676efe9cae02f6d7d4ae375dc835020b5f15fe66c21c027ec9c7f3cd33b2660391642a678c58e63
-
SSDEEP
6144:hjbl4aIa288oHDWIQAxPVgE8DKyBbPiP+:NmaIaRjDtF6xbKP+
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2712 eccstpf.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\eccstpf.exe 5121870bfc3d8eea5e307fed21f15570_NeikiAnalytics.exe File created C:\PROGRA~3\Mozilla\qtlrtjl.dll eccstpf.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 568 5121870bfc3d8eea5e307fed21f15570_NeikiAnalytics.exe 2712 eccstpf.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2712 2148 taskeng.exe 29 PID 2148 wrote to memory of 2712 2148 taskeng.exe 29 PID 2148 wrote to memory of 2712 2148 taskeng.exe 29 PID 2148 wrote to memory of 2712 2148 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\5121870bfc3d8eea5e307fed21f15570_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\5121870bfc3d8eea5e307fed21f15570_NeikiAnalytics.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:568
-
C:\Windows\system32\taskeng.exetaskeng.exe {69D3C8A3-47B2-4C8A-85EC-F56347CAA19D} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\PROGRA~3\Mozilla\eccstpf.exeC:\PROGRA~3\Mozilla\eccstpf.exe -ufgsyxd2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
262KB
MD5b3df9f28b9a8d3bd49ef1dcb88e647a9
SHA176b3b624b4e7fb14e928159b0d27ea196844798c
SHA2568573dd7f57debd39e494b73870d8e27d4765dc09c7ad1d73e3c7bc247995ac32
SHA5126494b91c4b6462c1cc57cbaa001eff1c4d8442e24a2766ab16df19e0ce003afd411f18fad4df7b06f4d4903ef0abaa738ee4144fae9439add985971f759dca64