Analysis
-
max time kernel
15s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
11-05-2024 02:12
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5696f8e372d8d38efa5d6fcfb755a3b0_NeikiAnalytics.exe
Resource
win7-20240508-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
5696f8e372d8d38efa5d6fcfb755a3b0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
windows10-2004-x64
5 signatures
150 seconds
Errors
Reason
Machine shutdown
General
-
Target
5696f8e372d8d38efa5d6fcfb755a3b0_NeikiAnalytics.exe
-
Size
306KB
-
MD5
5696f8e372d8d38efa5d6fcfb755a3b0
-
SHA1
44854fdec972e198fc8225104059c5b584bbd3f4
-
SHA256
0128e11fd4fc9002d950f31f6e93c740c9599754e79f7c0b4dbdf837cb033e68
-
SHA512
0bf4e402e0692551bf2e6720b54ab802f2f46fe06a77df6d7bf896e9c4e3cbdee14069f7d7889a0cf763f8638e0858bc23b1117609ba6cbb5670a849356ed69b
-
SSDEEP
6144:J1Pbwc2BVX/fGhQ/jyMtRrEHUmU54q0px9YuJ2i1uRV:HbwvDfGhQWM/OU541x9YuJ24q
Score
4/10
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\VSPCleanup.log 5696f8e372d8d38efa5d6fcfb755a3b0_NeikiAnalytics.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2976 5696f8e372d8d38efa5d6fcfb755a3b0_NeikiAnalytics.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 2976 5696f8e372d8d38efa5d6fcfb755a3b0_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5696f8e372d8d38efa5d6fcfb755a3b0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\5696f8e372d8d38efa5d6fcfb755a3b0_NeikiAnalytics.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2976
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2560
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:2512