Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 03:25
Static task
static1
Behavioral task
behavioral1
Sample
6c1757a93fdbfe7db3c6070db71fbb00_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
6c1757a93fdbfe7db3c6070db71fbb00_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
6c1757a93fdbfe7db3c6070db71fbb00_NeikiAnalytics.exe
-
Size
213KB
-
MD5
6c1757a93fdbfe7db3c6070db71fbb00
-
SHA1
5e2d8bc237b014863b4af4cba05adb8797cdf5c9
-
SHA256
7de7a6cd14e1ff25db4d9c4407c52d3a87ed8fd7ad0260cbe5c198595a9e72f7
-
SHA512
d75f0d61fb36529f5608d7e3aaafdbd78f0186bc3868e7c6803b2ba64d6912a6206f97033ff57e602f3f76567f2b7bc107dc3c6042c3e4fff5890b35d04f031b
-
SSDEEP
6144:jjm/aXSq3vnP6nVAn++Y5owG1QtKFZwsLt+GECuFNTgS7tDH0:jCYvnP6nin+viJatAjVE9FlJDH0
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2264 6c1757a93fdbfe7db3c6070db71fbb00_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 2264 6c1757a93fdbfe7db3c6070db71fbb00_NeikiAnalytics.exe -
Loads dropped DLL 1 IoCs
pid Process 1456 6c1757a93fdbfe7db3c6070db71fbb00_NeikiAnalytics.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1456 6c1757a93fdbfe7db3c6070db71fbb00_NeikiAnalytics.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2264 6c1757a93fdbfe7db3c6070db71fbb00_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1456 wrote to memory of 2264 1456 6c1757a93fdbfe7db3c6070db71fbb00_NeikiAnalytics.exe 29 PID 1456 wrote to memory of 2264 1456 6c1757a93fdbfe7db3c6070db71fbb00_NeikiAnalytics.exe 29 PID 1456 wrote to memory of 2264 1456 6c1757a93fdbfe7db3c6070db71fbb00_NeikiAnalytics.exe 29 PID 1456 wrote to memory of 2264 1456 6c1757a93fdbfe7db3c6070db71fbb00_NeikiAnalytics.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c1757a93fdbfe7db3c6070db71fbb00_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\6c1757a93fdbfe7db3c6070db71fbb00_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\6c1757a93fdbfe7db3c6070db71fbb00_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\6c1757a93fdbfe7db3c6070db71fbb00_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2264
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213KB
MD5380b7dcf180a74642b6745fe9215b0dd
SHA1482722a8286a875dbf485f871924e3b71433b24a
SHA256e9bd8e408154fa79fe19dbab341deb23e95aa881d63c28e819cfdf5371676d52
SHA5121c34298afcebe2fbd6b41b99dae85334bc284ed8e15b9225d0d7b8a213c1eed621e3ecbfd9579c0be4299cf3a5c90bb83ed168fc57e4d4d4dfc8ea55c4071a6b