Analysis
-
max time kernel
93s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 21:10
Static task
static1
Behavioral task
behavioral1
Sample
3a6c01c2d85f0945f88c7464c80ee550_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3a6c01c2d85f0945f88c7464c80ee550_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
3a6c01c2d85f0945f88c7464c80ee550_NeikiAnalytics.exe
-
Size
223KB
-
MD5
3a6c01c2d85f0945f88c7464c80ee550
-
SHA1
4cbf27e574d88598c813e4538c72bb2ef73fa7c4
-
SHA256
66aa7481522c526d8aaca6ec02f05d15bc324207791b42580f92a0142ede4393
-
SHA512
ff811627364ca9c60204d55165d2802d775a752ba566939d55500303e228b1425ca330a94b0250bd67125fcfce518d79658a757f7577642b7c4ec6fc0cf7beee
-
SSDEEP
3072:74G/rq0uNnmIJPld3kFkbENgscfL8QtX56hC22LLpPg7yLg9EPJxK5fOUqiz5ebq:8mIvdclcLh5ujQ+/6KRDMWP
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 4900 3a6c01c2d85f0945f88c7464c80ee550_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 4900 3a6c01c2d85f0945f88c7464c80ee550_NeikiAnalytics.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4564 3632 WerFault.exe 80 4684 4900 WerFault.exe 88 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3632 3a6c01c2d85f0945f88c7464c80ee550_NeikiAnalytics.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 4900 3a6c01c2d85f0945f88c7464c80ee550_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3632 wrote to memory of 4900 3632 3a6c01c2d85f0945f88c7464c80ee550_NeikiAnalytics.exe 88 PID 3632 wrote to memory of 4900 3632 3a6c01c2d85f0945f88c7464c80ee550_NeikiAnalytics.exe 88 PID 3632 wrote to memory of 4900 3632 3a6c01c2d85f0945f88c7464c80ee550_NeikiAnalytics.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a6c01c2d85f0945f88c7464c80ee550_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3a6c01c2d85f0945f88c7464c80ee550_NeikiAnalytics.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 3962⤵
- Program crash
PID:4564
-
-
C:\Users\Admin\AppData\Local\Temp\3a6c01c2d85f0945f88c7464c80ee550_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\3a6c01c2d85f0945f88c7464c80ee550_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4900 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4900 -s 3763⤵
- Program crash
PID:4684
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3632 -ip 36321⤵PID:2308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4900 -ip 49001⤵PID:3404
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
223KB
MD587f6f6e3a0d42690ce0df055241b9a47
SHA14df60a4a6416cc8c16e181058cbe6742a22f8282
SHA25630ac5ec6ef55af6ead37b75e06191f047f5c0ead2a9c7a7dda7bc48b37f7c6ef
SHA512d56518deed4a8667001c90d8b9278366d98616ca0481d8b537f2e30a662368f71d5e6fa7d0df425818a0de75c41802be661132f5e9a361b8c4f40382833c48c2