Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 00:48
Static task
static1
Behavioral task
behavioral1
Sample
41368263e1339f2d3c4411a800e67fe0_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
41368263e1339f2d3c4411a800e67fe0_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
41368263e1339f2d3c4411a800e67fe0_NeikiAnalytics.exe
-
Size
53KB
-
MD5
41368263e1339f2d3c4411a800e67fe0
-
SHA1
baf3c28349dab28d82905b73597e7febcef23108
-
SHA256
ab0b409511a995e5a4ac6f55711410ac437602e64545ec0e56898835884c720a
-
SHA512
b021ac6cecaf264249db274678587066d69c775567b9cc1b6160572d8e42268b959150f7fd24acc7657ffc47ec87a786b238c64b29aba798f1dbcedba252f8cc
-
SSDEEP
768:MApQr0ovdFJI34eGxusOy9Rp1pLeAxoeC48PqK1OtaP6cCFzENREMZ7Vr:MAaDJlMsh7pWezEPJB+O9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2484 sal.exe -
Loads dropped DLL 2 IoCs
pid Process 1928 41368263e1339f2d3c4411a800e67fe0_NeikiAnalytics.exe 1928 41368263e1339f2d3c4411a800e67fe0_NeikiAnalytics.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\sal.exe 41368263e1339f2d3c4411a800e67fe0_NeikiAnalytics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1928 wrote to memory of 2484 1928 41368263e1339f2d3c4411a800e67fe0_NeikiAnalytics.exe 28 PID 1928 wrote to memory of 2484 1928 41368263e1339f2d3c4411a800e67fe0_NeikiAnalytics.exe 28 PID 1928 wrote to memory of 2484 1928 41368263e1339f2d3c4411a800e67fe0_NeikiAnalytics.exe 28 PID 1928 wrote to memory of 2484 1928 41368263e1339f2d3c4411a800e67fe0_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\41368263e1339f2d3c4411a800e67fe0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\41368263e1339f2d3c4411a800e67fe0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\windows\SysWOW64\sal.exe"C:\windows\system32\sal.exe"2⤵
- Executes dropped EXE
PID:2484
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD5fa3c5514b7b03998ba64d99b9810495a
SHA1a9c3c75dc633df994bd7a9456f69966e2e25d9bc
SHA2561fc7a359891242ec5b6c13fd63c50d61ad62cdc37f51c6c7db27e32396350562
SHA512464cb2843d9138761439c01f14a985b9d2fd96706fda1c30a09ab4d4540c09417d28716b3c86a34864e2a642c37d468f050b65dbbb147ca06ec40d274b4cadc8