Analysis
-
max time kernel
163s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 12:06
Static task
static1
Behavioral task
behavioral1
Sample
db3277ea304f63914668782523e51960_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
db3277ea304f63914668782523e51960_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
db3277ea304f63914668782523e51960_NeikiAnalytics.exe
-
Size
73KB
-
MD5
db3277ea304f63914668782523e51960
-
SHA1
520bd7a472901dce02ee575ea4b374991f27ff41
-
SHA256
8ebfb3434177fd9fdb747b3f65c2597c09713adde37360a62a70325155fd00d2
-
SHA512
1143def229d85ce31626efade61871e906f663fef1bbeadf64cdb842ff4d805a497fa5eece6e94871702d72ca435b402bc43c1748e7ddfee55a6e1312ae41609
-
SSDEEP
1536:hbtunLPOWmK5QPqfhVWbdsmA+RjPFLC+e5hn0ZGUGf2g:hYny9NPqfcxA+HFshnOg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4712 [email protected] -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4464 wrote to memory of 1192 4464 db3277ea304f63914668782523e51960_NeikiAnalytics.exe 92 PID 4464 wrote to memory of 1192 4464 db3277ea304f63914668782523e51960_NeikiAnalytics.exe 92 PID 4464 wrote to memory of 1192 4464 db3277ea304f63914668782523e51960_NeikiAnalytics.exe 92 PID 1192 wrote to memory of 4712 1192 cmd.exe 93 PID 1192 wrote to memory of 4712 1192 cmd.exe 93 PID 1192 wrote to memory of 4712 1192 cmd.exe 93 PID 4712 wrote to memory of 2076 4712 [email protected] 94 PID 4712 wrote to memory of 2076 4712 [email protected] 94 PID 4712 wrote to memory of 2076 4712 [email protected] 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\db3277ea304f63914668782523e51960_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\db3277ea304f63914668782523e51960_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\SysWOW64\cmd.exePID:1192
-
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:4712
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 00.exe4⤵PID:2076
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3404 --field-trial-handle=2252,i,16022092570067181109,3235558581947505669,262144 --variations-seed-version /prefetch:81⤵PID:1556
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize73KB
MD5e80eeb7b20b06bbe57c63a6ac32015b7
SHA1c7e972f9272e8075a250c8d15717444e32fe3262
SHA256ac4b1fae0dca6e8a4fc37711ad93c8095812c1bb8b52e4b0098c60cfea96f73f
SHA512cdd0c3f1f283db95be55949a462066834da5a4bf99c4ed5491261a5ebbd08359ab11aad091212f18238a33c94c6164e1ea324d6c827a4c16bab61019a0485146
-
Filesize
2KB
MD57b621943a35e7f39cf89f50cc48d7b94
SHA12858a28cf60f38025fffcd0ba2ecfec8511c197d
SHA256bef04c2f89dc115ce2763558933dba1767bf30cda6856d335ae68955923f9991
SHA5124169e664ad4e7e6891a05ceed78465e0ec44879b37fc0de97c014945e10c161f6bfb040efc24edc136e69bb115b2a1327b04cefb58141f712da856129872e8f1