Analysis
-
max time kernel
121s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 13:00
Static task
static1
Behavioral task
behavioral1
Sample
e8264ae87c0eb12551637dee818e4900_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e8264ae87c0eb12551637dee818e4900_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
e8264ae87c0eb12551637dee818e4900_NeikiAnalytics.exe
-
Size
6.0MB
-
MD5
e8264ae87c0eb12551637dee818e4900
-
SHA1
f44e76e762a8c44c47204bd4476a2e03e184eeff
-
SHA256
c8510a3cda540824948abee30fcf2fc6923ee3864159475d16dc7395a8cd473f
-
SHA512
8cf3a42e9148c50cdeb1e870085c7a004ad0ce0f360d2775464ef36becc482a01acb498c06cb6fe356a85aafa7fd0e08f34a817fdfd70d8af70ff5c09fd80151
-
SSDEEP
98304:emhd1UryewpoevGeuV7wQqZUha5jtSyZIUS:elQpHv7u2QbaZtlir
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2856 A322.tmp -
Executes dropped EXE 1 IoCs
pid Process 2856 A322.tmp -
Loads dropped DLL 2 IoCs
pid Process 2444 e8264ae87c0eb12551637dee818e4900_NeikiAnalytics.exe 2444 e8264ae87c0eb12551637dee818e4900_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2444 wrote to memory of 2856 2444 e8264ae87c0eb12551637dee818e4900_NeikiAnalytics.exe 28 PID 2444 wrote to memory of 2856 2444 e8264ae87c0eb12551637dee818e4900_NeikiAnalytics.exe 28 PID 2444 wrote to memory of 2856 2444 e8264ae87c0eb12551637dee818e4900_NeikiAnalytics.exe 28 PID 2444 wrote to memory of 2856 2444 e8264ae87c0eb12551637dee818e4900_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8264ae87c0eb12551637dee818e4900_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\e8264ae87c0eb12551637dee818e4900_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\A322.tmp"C:\Users\Admin\AppData\Local\Temp\A322.tmp" --splashC:\Users\Admin\AppData\Local\Temp\e8264ae87c0eb12551637dee818e4900_NeikiAnalytics.exe 135CE8F1AC96129C93677648F04C4832C7BA5BEA65A94C4E67B9C965D78171A8C941C20097A71A9942AD9C7ED7436BB9C6EE302E2684DB4D47CD4AC79AE2110B2⤵
- Deletes itself
- Executes dropped EXE
PID:2856
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.9MB
MD54ba2115f840a9ebfec3f69ba18072d81
SHA1c45eb6486b2131e063dc47f1028597ffbbbfff20
SHA25646b7265a9463b817a6babfe4d4d948f52d02c8e0902180a1ef417efeb8163330
SHA5123878220f5663640f0eba11f878a729aed28d82eac4243702bed4b6c1520b4b7b18b6a1413952bffc2090c1e01ed8529786922e181d84e8a538fb22adbe88e181
-
Filesize
6.0MB
MD5c20f6abd9a55b621687f73220320278e
SHA1252a058ff0dc6f02cd045d4805c93f0e6bc453c1
SHA2562805fc663a45905e0be51f4b7b9da1a1bd3f1c0f19691bb4a370454966d45b95
SHA512553cde620f8622de74491b2bfc85012eb18bb0521fa637f561bb0dc472d3575aaf1c89804e73809899a748d38e8af3d24648dc29aa44b35461b47d4375f8e347