Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 21:10
Static task
static1
Behavioral task
behavioral1
Sample
3a6c01c2d85f0945f88c7464c80ee550_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3a6c01c2d85f0945f88c7464c80ee550_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
3a6c01c2d85f0945f88c7464c80ee550_NeikiAnalytics.exe
-
Size
223KB
-
MD5
3a6c01c2d85f0945f88c7464c80ee550
-
SHA1
4cbf27e574d88598c813e4538c72bb2ef73fa7c4
-
SHA256
66aa7481522c526d8aaca6ec02f05d15bc324207791b42580f92a0142ede4393
-
SHA512
ff811627364ca9c60204d55165d2802d775a752ba566939d55500303e228b1425ca330a94b0250bd67125fcfce518d79658a757f7577642b7c4ec6fc0cf7beee
-
SSDEEP
3072:74G/rq0uNnmIJPld3kFkbENgscfL8QtX56hC22LLpPg7yLg9EPJxK5fOUqiz5ebq:8mIvdclcLh5ujQ+/6KRDMWP
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2080 3a6c01c2d85f0945f88c7464c80ee550_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 2080 3a6c01c2d85f0945f88c7464c80ee550_NeikiAnalytics.exe -
Loads dropped DLL 1 IoCs
pid Process 2428 3a6c01c2d85f0945f88c7464c80ee550_NeikiAnalytics.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2428 3a6c01c2d85f0945f88c7464c80ee550_NeikiAnalytics.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2080 3a6c01c2d85f0945f88c7464c80ee550_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2428 wrote to memory of 2080 2428 3a6c01c2d85f0945f88c7464c80ee550_NeikiAnalytics.exe 29 PID 2428 wrote to memory of 2080 2428 3a6c01c2d85f0945f88c7464c80ee550_NeikiAnalytics.exe 29 PID 2428 wrote to memory of 2080 2428 3a6c01c2d85f0945f88c7464c80ee550_NeikiAnalytics.exe 29 PID 2428 wrote to memory of 2080 2428 3a6c01c2d85f0945f88c7464c80ee550_NeikiAnalytics.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a6c01c2d85f0945f88c7464c80ee550_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3a6c01c2d85f0945f88c7464c80ee550_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\3a6c01c2d85f0945f88c7464c80ee550_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\3a6c01c2d85f0945f88c7464c80ee550_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2080
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
223KB
MD52a8516ac6eba47b6e46992a1d995cdca
SHA1ab653bb845bf8b4d6d66a95963a31ac4e112c1b5
SHA25618e4db09e583990d272abf6cf1c9879bb34f25bfffb19f2fea1b3aaa42e753dc
SHA51238de098c737135e3b794d38998e427c202cccbe31b97e7a35452607490ae5ff39ee8ec06e52b5287dd402011ccd50803183ba698fa423ae8ee462acd17ff527a