Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 07:29
Static task
static1
Behavioral task
behavioral1
Sample
a16975f103428b76a099875832300b20_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a16975f103428b76a099875832300b20_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
a16975f103428b76a099875832300b20_NeikiAnalytics.exe
-
Size
4.4MB
-
MD5
a16975f103428b76a099875832300b20
-
SHA1
6c5bcec99952e9708449353399fc2e13221e0b3f
-
SHA256
659ea27e66e8e9e5398773a7ec60954faa065733b276ed838fde12b9d4b967df
-
SHA512
162f98ef2bedc3460a98a121910afc1669c46dc1827cbbcfcd9f932af2178f5ccb35d60cd78aea5b6f18401994e8dc4e6f94ef79d408315345625bc2d17c6eca
-
SSDEEP
98304:emhd1UryeabPpWRAQ+pVhV7wQqZUha5jtSn:elGWdMVh2QbaZte
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2124 81DD.tmp -
Executes dropped EXE 1 IoCs
pid Process 2124 81DD.tmp -
Loads dropped DLL 2 IoCs
pid Process 2184 a16975f103428b76a099875832300b20_NeikiAnalytics.exe 2184 a16975f103428b76a099875832300b20_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2124 2184 a16975f103428b76a099875832300b20_NeikiAnalytics.exe 28 PID 2184 wrote to memory of 2124 2184 a16975f103428b76a099875832300b20_NeikiAnalytics.exe 28 PID 2184 wrote to memory of 2124 2184 a16975f103428b76a099875832300b20_NeikiAnalytics.exe 28 PID 2184 wrote to memory of 2124 2184 a16975f103428b76a099875832300b20_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a16975f103428b76a099875832300b20_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\a16975f103428b76a099875832300b20_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\81DD.tmp"C:\Users\Admin\AppData\Local\Temp\81DD.tmp" --splashC:\Users\Admin\AppData\Local\Temp\a16975f103428b76a099875832300b20_NeikiAnalytics.exe BFB3DA072219718FE5CFDEE39A5C786265418816AC4610DC75E8BBB690AC14306C5FEEDA7826FCB11EC4D27776550114CD38D0031FE540015B5CD0F9533B95542⤵
- Deletes itself
- Executes dropped EXE
PID:2124
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.4MB
MD5e5dd1b32c3e4bcd8731a5d4f3e9721d9
SHA18090ae177030fe8a3f052e796bd082e2fb973388
SHA256d1f0fc2b75d2a9a9381fde4b7d32257c4d3f6e41dee39f09e29c0909471dcfcd
SHA512360218234ce5fb71bdb7c6699cf68e2decaa350b35b1f5093f8288fdc0b70f4b38862769229976898fc398aa3178a83f29adf0cac3ad1131d64e0c28ca307e6b