Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 00:45
Static task
static1
Behavioral task
behavioral1
Sample
4049db88914b624e4fee5c5592bc4240_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4049db88914b624e4fee5c5592bc4240_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
4049db88914b624e4fee5c5592bc4240_NeikiAnalytics.exe
-
Size
231KB
-
MD5
4049db88914b624e4fee5c5592bc4240
-
SHA1
dfe81573dd1e6459a41225833d34789b7513c546
-
SHA256
0725e89f5d768105d0e2ef07d3ad01b380bf5c408fbd275d71e022c5c25949f4
-
SHA512
3cd893020fcf8eb252df29a163887e39ffff7ed8247c19a38b63e1c104400b6c4166653ea6960701ecd2b9de01c35a45110926785b9a9517eea38671df359da6
-
SSDEEP
3072:tVX9UjrL5vSfmPuv6t2OsS1jPuwrVZXAUN1zHXyLlnem+JDlnO:tHUTxSfmm6t2OT1iqVZ11ziImUlO
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 2852 tbckyxk.exe -
Loads dropped DLL 3 IoCs
pid Process 2852 tbckyxk.exe 2852 tbckyxk.exe 2852 tbckyxk.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\tbckyxk.exe 4049db88914b624e4fee5c5592bc4240_NeikiAnalytics.exe File created C:\PROGRA~3\Mozilla\newtrln.dll tbckyxk.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2212 4049db88914b624e4fee5c5592bc4240_NeikiAnalytics.exe 2852 tbckyxk.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2852 2688 taskeng.exe 29 PID 2688 wrote to memory of 2852 2688 taskeng.exe 29 PID 2688 wrote to memory of 2852 2688 taskeng.exe 29 PID 2688 wrote to memory of 2852 2688 taskeng.exe 29 PID 2688 wrote to memory of 2852 2688 taskeng.exe 29 PID 2688 wrote to memory of 2852 2688 taskeng.exe 29 PID 2688 wrote to memory of 2852 2688 taskeng.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\4049db88914b624e4fee5c5592bc4240_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\4049db88914b624e4fee5c5592bc4240_NeikiAnalytics.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2212
-
C:\Windows\system32\taskeng.exetaskeng.exe {715C2B8C-FAF5-4E97-BAB7-D07B04A4C709} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\PROGRA~3\Mozilla\tbckyxk.exeC:\PROGRA~3\Mozilla\tbckyxk.exe -gqpcbye2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
231KB
MD588675a9df0c67b18a7fe5572bf02a500
SHA13dc475fda64ac05f88323aab77edcc9ac2c1961e
SHA2564596fa5395ca2d7a989892e15f36be5666b8a871f2be5e00e54b13af39ede337
SHA512e47ad8245c1c9636fc28b58a41f884b5acafd959b003e51e30d33ae921168429ca3977a57e358de17553b81761e5bed3614cf9ae29f82651ef967401eeee55aa