Analysis
-
max time kernel
139s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 11:31
Static task
static1
Behavioral task
behavioral1
Sample
d2853a255eac91ad428f9d41d7826200_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
d2853a255eac91ad428f9d41d7826200_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
d2853a255eac91ad428f9d41d7826200_NeikiAnalytics.exe
-
Size
79KB
-
MD5
d2853a255eac91ad428f9d41d7826200
-
SHA1
18200d3db56e1c698a08760bf94e51190653b5c9
-
SHA256
de13a34b0b48f048620980909d1281a75b3eb2106aa2ef6655c8dd44d978ec48
-
SHA512
0c7faab772bd0b6a5301d99704d6a54cad5e6dec58d733f7d8da5b5d9375990a151fd7cb39cf4759d68f249e8297da3aa125ea7dbc6fe9ad0c0b0ec2f6efe812
-
SSDEEP
1536:zvDkSFQbBgkHBsSpOQA8AkqUhMb2nuy5wgIP0CSJ+5yCCmB8GMGlZ5G:zvDk8IBTSlGdqU7uy5w9WMyCFN5G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3268 [email protected] -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4400 wrote to memory of 4212 4400 d2853a255eac91ad428f9d41d7826200_NeikiAnalytics.exe 85 PID 4400 wrote to memory of 4212 4400 d2853a255eac91ad428f9d41d7826200_NeikiAnalytics.exe 85 PID 4400 wrote to memory of 4212 4400 d2853a255eac91ad428f9d41d7826200_NeikiAnalytics.exe 85 PID 4212 wrote to memory of 3268 4212 cmd.exe 86 PID 4212 wrote to memory of 3268 4212 cmd.exe 86 PID 4212 wrote to memory of 3268 4212 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2853a255eac91ad428f9d41d7826200_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\d2853a255eac91ad428f9d41d7826200_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Windows\SysWOW64\cmd.exePID:4212
-
C:\Users\Admin\AppData\Local\Temp\[email protected]PID:3268
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\[email protected]
Filesize79KB
MD5fa3eaed383403b67d5698f7f02289c8c
SHA1cb1e9020d2fc1d63bb0f722afff13a0aade662ab
SHA25623ac92196b4127e6dabb461e3b117956ee0aa1c51b872e372872b65c67ea09a6
SHA5122cb02e18936798e887f9f8f515b3e35e3db22b268e16ca41e1709c7f09b729aa93a22442aaf2d93d7e575919b42a26a5a047ee47126f7500dd908d9cdd7b6c7c