Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    10-05-2024 02:48

General

  • Target

    52a15bf3eb7b00ff005373d78b936030_NeikiAnalytics.exe

  • Size

    256KB

  • MD5

    52a15bf3eb7b00ff005373d78b936030

  • SHA1

    872a7c4c0d91c7d81ea9d144d2b53192d58260ff

  • SHA256

    7d32189278b6bc796b274edc41e9b8d0f71fb6b2d8e6c503d1dc7e55c5590e13

  • SHA512

    9720f8736fa1b249d9770cbc86c7c1c12e8f73d57463c892dd05845e887a5ccb763a7a25cb522fa1a045a82a93771f293eb9fde25b1ce017870b4b15b55d3a5c

  • SSDEEP

    6144:K+i/YnS0sUP5fh6jTFRbf0eN0W7cyqCxSn1:lPS/Gfh6XFRbf0ez0n1

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\52a15bf3eb7b00ff005373d78b936030_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\52a15bf3eb7b00ff005373d78b936030_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2900
    • C:\Users\Admin\AppData\Local\Temp\52a15bf3eb7b00ff005373d78b936030_NeikiAnalytics.exe
      C:\Users\Admin\AppData\Local\Temp\52a15bf3eb7b00ff005373d78b936030_NeikiAnalytics.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of UnmapMainImage
      PID:2016

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\52a15bf3eb7b00ff005373d78b936030_NeikiAnalytics.exe

    Filesize

    256KB

    MD5

    5605b602c0800ea412ca59f6f26d6d0b

    SHA1

    4a74e7df91901c9f12a22ab0e9496e23db2b1e19

    SHA256

    144566a2b40eff23d2186938fbfdc685dd23bcd06dbea78d7ddcbe847fce45c0

    SHA512

    13716a93f8072c4972a6b6fda794ab6ceec414962d6a7ca1913afc1eed4a415f0bea41848e26fed4963bf1677f6e72dfd43bd0870ccdc14d7ac78c9428de3726

  • memory/2016-16-0x00000000000C0000-0x0000000000100000-memory.dmp

    Filesize

    256KB

  • memory/2016-15-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2016-10-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2900-0-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2900-8-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB