Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
10-05-2024 02:48
Static task
static1
Behavioral task
behavioral1
Sample
52a15bf3eb7b00ff005373d78b936030_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
52a15bf3eb7b00ff005373d78b936030_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
52a15bf3eb7b00ff005373d78b936030_NeikiAnalytics.exe
-
Size
256KB
-
MD5
52a15bf3eb7b00ff005373d78b936030
-
SHA1
872a7c4c0d91c7d81ea9d144d2b53192d58260ff
-
SHA256
7d32189278b6bc796b274edc41e9b8d0f71fb6b2d8e6c503d1dc7e55c5590e13
-
SHA512
9720f8736fa1b249d9770cbc86c7c1c12e8f73d57463c892dd05845e887a5ccb763a7a25cb522fa1a045a82a93771f293eb9fde25b1ce017870b4b15b55d3a5c
-
SSDEEP
6144:K+i/YnS0sUP5fh6jTFRbf0eN0W7cyqCxSn1:lPS/Gfh6XFRbf0ez0n1
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2016 52a15bf3eb7b00ff005373d78b936030_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 2016 52a15bf3eb7b00ff005373d78b936030_NeikiAnalytics.exe -
Loads dropped DLL 1 IoCs
pid Process 2900 52a15bf3eb7b00ff005373d78b936030_NeikiAnalytics.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2016 52a15bf3eb7b00ff005373d78b936030_NeikiAnalytics.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2900 52a15bf3eb7b00ff005373d78b936030_NeikiAnalytics.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2016 52a15bf3eb7b00ff005373d78b936030_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2900 wrote to memory of 2016 2900 52a15bf3eb7b00ff005373d78b936030_NeikiAnalytics.exe 28 PID 2900 wrote to memory of 2016 2900 52a15bf3eb7b00ff005373d78b936030_NeikiAnalytics.exe 28 PID 2900 wrote to memory of 2016 2900 52a15bf3eb7b00ff005373d78b936030_NeikiAnalytics.exe 28 PID 2900 wrote to memory of 2016 2900 52a15bf3eb7b00ff005373d78b936030_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\52a15bf3eb7b00ff005373d78b936030_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\52a15bf3eb7b00ff005373d78b936030_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\52a15bf3eb7b00ff005373d78b936030_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\52a15bf3eb7b00ff005373d78b936030_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
PID:2016
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD55605b602c0800ea412ca59f6f26d6d0b
SHA14a74e7df91901c9f12a22ab0e9496e23db2b1e19
SHA256144566a2b40eff23d2186938fbfdc685dd23bcd06dbea78d7ddcbe847fce45c0
SHA51213716a93f8072c4972a6b6fda794ab6ceec414962d6a7ca1913afc1eed4a415f0bea41848e26fed4963bf1677f6e72dfd43bd0870ccdc14d7ac78c9428de3726