Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 02:57
Static task
static1
Behavioral task
behavioral1
Sample
54f23c088ba64b1b05657831a7437e80_NeikiAnalytics.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
54f23c088ba64b1b05657831a7437e80_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
54f23c088ba64b1b05657831a7437e80_NeikiAnalytics.exe
-
Size
73KB
-
MD5
54f23c088ba64b1b05657831a7437e80
-
SHA1
ff192f505a26d46c87d6b92277a541fdcfba1004
-
SHA256
d46af92e9d04532a59aaecad1b4b0fed5f7c95f7542541376aa8c155682cb6da
-
SHA512
c07db8df91a1796b54cb3d57f5092a9a3a48a4bf9c7f5f3540c8354128e4e9f47a04378bc9001b08bbd99d48a0ab00e347949e11b4bb62a9e11dcd863e76ec1a
-
SSDEEP
1536:hbO0llp4JuLK5QPqfhVWbdsmA+RjPFLC+e5h60ZGUGf2g:hTlp4WNPqfcxA+HFsh6Og
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 632 [email protected] -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3388 wrote to memory of 2828 3388 54f23c088ba64b1b05657831a7437e80_NeikiAnalytics.exe 83 PID 3388 wrote to memory of 2828 3388 54f23c088ba64b1b05657831a7437e80_NeikiAnalytics.exe 83 PID 3388 wrote to memory of 2828 3388 54f23c088ba64b1b05657831a7437e80_NeikiAnalytics.exe 83 PID 2828 wrote to memory of 632 2828 cmd.exe 84 PID 2828 wrote to memory of 632 2828 cmd.exe 84 PID 2828 wrote to memory of 632 2828 cmd.exe 84 PID 632 wrote to memory of 2708 632 [email protected] 85 PID 632 wrote to memory of 2708 632 [email protected] 85 PID 632 wrote to memory of 2708 632 [email protected] 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\54f23c088ba64b1b05657831a7437e80_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\54f23c088ba64b1b05657831a7437e80_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Windows\SysWOW64\cmd.exePID:2828
-
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:632
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 00.exe4⤵PID:2708
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize73KB
MD505cb25690f316f9fa8fd8c81ace08751
SHA1e91ae4267f868b7bc0d49b6357d8a0a4e7f08ca6
SHA256f73613faf07fd71520ab8331f27ccfc8a233931681f7fa85b35f80e800b784b6
SHA512f7a6b705c21656c88f90ec96760a31439b62f9bff1f3780b4d3f27ffdd1ce45a480fa4cdfc933dc68ae8f79b6b26a069491f0e9dda0c7bbeb622ab1182a2e8fe
-
Filesize
2KB
MD57b621943a35e7f39cf89f50cc48d7b94
SHA12858a28cf60f38025fffcd0ba2ecfec8511c197d
SHA256bef04c2f89dc115ce2763558933dba1767bf30cda6856d335ae68955923f9991
SHA5124169e664ad4e7e6891a05ceed78465e0ec44879b37fc0de97c014945e10c161f6bfb040efc24edc136e69bb115b2a1327b04cefb58141f712da856129872e8f1