Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    10/05/2024, 04:56

General

  • Target

    75552440685c9dc4644df81c7e365370_NeikiAnalytics.exe

  • Size

    7.5MB

  • MD5

    75552440685c9dc4644df81c7e365370

  • SHA1

    0935691adc68a97a6a677c3fa8751568b04b383e

  • SHA256

    f079f9374811130ef9b4df4ecb0d7b70cc253c2df7774ddb3f13363797f52124

  • SHA512

    74dd580f6f2ef2ca8b193d7d522034f1f2235cd95e176c646cf4aab4d975567fa096d3b66fa6df15e89abad5361e6b3812ea51df68e47e90d6fcc1fc6c50ed45

  • SSDEEP

    98304:3h5cyZ/K9NFLsO0MJdX1ezhQcSZcOb+sX1Zvbed4Z0FGRABTgtse6vzovkGx:3h5lZ/WFAnMJdehQcERCsXDjyZkJMY

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\75552440685c9dc4644df81c7e365370_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\75552440685c9dc4644df81c7e365370_NeikiAnalytics.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1644
    • C:\Users\Admin\AppData\Local\Temp\75552440685c9dc4644df81c7e365370_NeikiAnalytics.exe
      "C:\Users\Admin\AppData\Local\Temp\75552440685c9dc4644df81c7e365370_NeikiAnalytics.exe"
      2⤵
      • Loads dropped DLL
      PID:3016

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI16442\python39.dll

    Filesize

    4.3MB

    MD5

    5cd203d356a77646856341a0c9135fc6

    SHA1

    a1f4ac5cc2f5ecb075b3d0129e620784814a48f7

    SHA256

    a56afcf5f3a72769c77c3bc43c9b84197180a8b3380b6258073223bfd72ed47a

    SHA512

    390008d57fa711d7c88b77937bf16fdb230e7c1e7182faea6d7c206e9f65ced6f2e835f9da9befb941e80624abe45875602e0e7ad485d9a009d2450a2a0e0f1f