Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
10-05-2024 19:32
Behavioral task
behavioral1
Sample
54cc0c85224445e5225870e60fe4f020_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
54cc0c85224445e5225870e60fe4f020_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
54cc0c85224445e5225870e60fe4f020_NeikiAnalytics.exe
-
Size
4.9MB
-
MD5
54cc0c85224445e5225870e60fe4f020
-
SHA1
860bea0071ea1ceb3910b6801d781454ed85c331
-
SHA256
7ea06b883d26a3e5f47f01336f67b1aa02e1577ed150dbbef99085578e538837
-
SHA512
37caa585aa5c3811fda7e3b0de558cf3c3e824b2b3209bed580c0819b9aa11ba4038ae22c8a2dadb035521da97de6dc3b99f7e01f8bb2d9515c3f71ebc16f0ad
-
SSDEEP
98304:psMMMkYedXmTjJ5q7x243PYUbONjTy2UUBKIkFBUUqzR:GHd4J5q1FYU0/y2UUAI6iUq
Malware Config
Signatures
-
Loads dropped DLL 13 IoCs
pid Process 2580 54cc0c85224445e5225870e60fe4f020_NeikiAnalytics.exe 2580 54cc0c85224445e5225870e60fe4f020_NeikiAnalytics.exe 2580 54cc0c85224445e5225870e60fe4f020_NeikiAnalytics.exe 2580 54cc0c85224445e5225870e60fe4f020_NeikiAnalytics.exe 2580 54cc0c85224445e5225870e60fe4f020_NeikiAnalytics.exe 2580 54cc0c85224445e5225870e60fe4f020_NeikiAnalytics.exe 2580 54cc0c85224445e5225870e60fe4f020_NeikiAnalytics.exe 2580 54cc0c85224445e5225870e60fe4f020_NeikiAnalytics.exe 2580 54cc0c85224445e5225870e60fe4f020_NeikiAnalytics.exe 2580 54cc0c85224445e5225870e60fe4f020_NeikiAnalytics.exe 2580 54cc0c85224445e5225870e60fe4f020_NeikiAnalytics.exe 2580 54cc0c85224445e5225870e60fe4f020_NeikiAnalytics.exe 2580 54cc0c85224445e5225870e60fe4f020_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: 35 2580 54cc0c85224445e5225870e60fe4f020_NeikiAnalytics.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2580 54cc0c85224445e5225870e60fe4f020_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2924 wrote to memory of 2580 2924 54cc0c85224445e5225870e60fe4f020_NeikiAnalytics.exe 29 PID 2924 wrote to memory of 2580 2924 54cc0c85224445e5225870e60fe4f020_NeikiAnalytics.exe 29 PID 2924 wrote to memory of 2580 2924 54cc0c85224445e5225870e60fe4f020_NeikiAnalytics.exe 29 PID 2924 wrote to memory of 2580 2924 54cc0c85224445e5225870e60fe4f020_NeikiAnalytics.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\54cc0c85224445e5225870e60fe4f020_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\54cc0c85224445e5225870e60fe4f020_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\54cc0c85224445e5225870e60fe4f020_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\54cc0c85224445e5225870e60fe4f020_NeikiAnalytics.exe"2⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2580
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD52dd25ac2510c5640169d89ee220e748e
SHA138fd561088e61e4dbb97a026bfee8fbf6533250e
SHA256f5086031019c5e03afcfee227c4d30e82b68c24f5a5871640c3e8682852d9a54
SHA512e4fab2e20031dec366c113fe10ff81d759a2a1837cd1ee2598bb6c1107cb16a6db13501b69e80ee08e61005020b557221f858b690e2a3bab13a94fb04f87ef62
-
Filesize
105KB
MD54873eef1f9b652605cb7567bf5f63a59
SHA1699bcc7439c2255eb54b3048a0255624cfcfb1d4
SHA256c1688643a182f1b9692284ee24293ae90b5496e95b356d6ec175f18d9a6ec566
SHA512335a9d6a6f5f0189a1b906561e3bf1d5f6c86d17fdc952fd45a8e6a3d6b814ad919e8ca9ae5f3a6261549361cd4b5f00d366ceb77c66b4c562fd53692b24b2d4
-
Filesize
31KB
MD5d7fb745382c6356cb58a865b7868a87f
SHA1c05940c7e57e7e1c8e031d1644cd91f507adf5e1
SHA256a5ced194f4a143e6f517c22e6a1edbabca0d875243845bc57a87c2d70c07f23d
SHA5121a19293c041811a72dbc88807aaa6a396600732f716ccbb2d976850c01f69d1ddeb5101e56c9b92fbb02496481e9da3fcc47af96bf8e9102477f9f28386f94c4
-
Filesize
180KB
MD53f9883975873f598093f33164be01fbc
SHA1851b304266d19ec89193ade145e7aa7094cb9217
SHA2561afb4acf310dc86ab032cf27fb59c468ca7e65448b899dc31d5a53317d5bc831
SHA512a0613ed7bbab49a8da297d4947d5595c0637df1186834e19db8bc800d2f01bc1f8531e20921093778e1006edcf6705d9e49751106552520c0dd001c66a5dfc6c
-
Filesize
23KB
MD54f38eb31e85412b5bb3cc955f7a83cfb
SHA15752194a2987b795636e708bae7d436e064790ec
SHA256326f00f00dabf86b33325b8f6344a141aefb2a56ba5c173d2efe175efa72058b
SHA512814f7904ec79ca03750fc57b64329c8ef4c3fe3648f65b63ec103b21a07278f038e8b786559085b612abd442d67493681e3bf8f6a6ab18c2b112b67a9e327f37
-
Filesize
65KB
MD586d72934a494121978ef74c8b8aca5a4
SHA13c15697eee23365722f79d70710ac0a1ba5de6e1
SHA25624657ecfde063412c941aaa6a085341d45ecf4c0153b37b7476459835ccb3cbb
SHA512b7e720d4801690b6c610726046070b8a761113c30a14d6c54205f3ea5ae273494fa28b1fe57c33e196b71d7b2c1be28a3acbf5a3337cad0e9e4216918d8487e7
-
Filesize
101KB
MD56e8d415d50d8292dbfb479447ac09c27
SHA1cb2154d70a5cb9a875309e0860b82a825c6416f0
SHA2565b616af730aa15a75558afa50e725c7d4d4e5b22bbffd348df2239425cfeadd0
SHA512a8196e2536a3c733b59fa11da10f85eda0d2c50deb246d895fccbcb7f8e33c7aa11928ce8264eabaf0e9c761f5b11c7e65cb4ec503c0338c90e1d7180f7c0bac
-
Filesize
767KB
MD5b8fafa013ab3d73f5540f4dca668e134
SHA125e1de1f13d256496e8244e29e049f69b91527a8
SHA256e813be961090b612af2136418f91671c3192da594b86cd6d47d8a725595cece1
SHA512e290163cc8cca66ef628e336d55e2df58fa82453693c2457f978e84e082f83a2c31456ef1e7daf9507a4653436a3750ccf4b7fa8e923b1da8b11c1bf2e50f8c4
-
Filesize
1.8MB
MD525c4ebe7eb728eb40f9f9857849abad9
SHA1d907b46d6b5924a4d887438583145b8d2edda10c
SHA256ee585c57129d29c67d1f038ca35113ce34319bff1e8e163588e394dd096cd04a
SHA5129f43ac67d873d28415ce4bb6d5823f361c31a018e3a4d56f191f9c2503ea0e41a8c3b7ca7860bd1abc013e3827ec2d47d9577ddbc128e10a1c2ac78615f7c8a9
-
Filesize
396KB
MD5a11c90defa3969b20b8730450447636c
SHA105ec6e2fae9ad1d8446341f0e87d2d0fd7398bf0
SHA2565b24d33ef69546a929b021738018c55ee6cea62b3ddd8d69a78dcad4dc5c6255
SHA512d1d1469ed7280b66f9fbd1fae9d1bdc91be8b7a7f2340a4e6163da33f0a4a13043b6f4f5c6eb30bdc164991c16bcec0872e66c9843cc38ddc982e49c41e8cc3b
-
Filesize
3.4MB
MD5c66cff63d88f6e9dd4d8e12263a928b5
SHA195c617965db8d8ddb76c2775a2441d1609605162
SHA2561d70473101f95a42764c8430548645b0a9786bac0fe08367f593416c9b791718
SHA512993001dcf9448dedf49fea89a76294364501dd09eac88184511e6ebab997119ac94e3e9d596d02571174f5a04b1d4ec6888f494eb0810e28bdb674867695005b
-
Filesize
22KB
MD591ce806fb378ca8e5752aefeb5775da8
SHA15d18e0120b181f56562c228a360283fed1071d1f
SHA256715b9028dbd2faef7a084b8919086fe258b5069f295655deae5dff95f6cb23f6
SHA512ef557947653936f1dc9e68730d7edba420a2b7011c85fa55446c31f60e1af3732aa312fee91d72c39223d008d0231047d55d77e649ed1e6a09de663b78246fd7
-
Filesize
1.0MB
MD5c184941d097bf03782cc74b785e6dada
SHA1c4ca2607047ef69e0cff516d38c4147087f45b02
SHA25695c2e7b6bb25a0beb8a5c0376ceed33098d9991cda0414f844f5b9b506167891
SHA5121c284dbff3ddfc76af8a649d237f90e87a9ecd7e36783626ebff7fca1cf1532b6b455372445b29352bc12df23a2e095f994f0ca454877f9ea38558875c314137
-
Filesize
84KB
MD5ae96651cfbd18991d186a029cbecb30c
SHA118df8af1022b5cb188e3ee98ac5b4da24ac9c526
SHA2561b372f064eacb455a0351863706e6326ca31b08e779a70de5de986b5be8069a1
SHA51242a58c17f63cf0d404896d3b4bb16b2c9270cc2192aa4c9be265ed3970dfc2a4115e1db08f35c39e403b4c918be4ed7d19d2e2e015cb06b33d26a6c6521556e7