Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
12/05/2024, 08:03
Static task
static1
Behavioral task
behavioral1
Sample
80e7081e746ad33c938c726e010ae860_NeikiAnalytics.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
80e7081e746ad33c938c726e010ae860_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
80e7081e746ad33c938c726e010ae860_NeikiAnalytics.exe
-
Size
4.8MB
-
MD5
80e7081e746ad33c938c726e010ae860
-
SHA1
c0fda642d8a6ba129ee0a6c01a239a5bf1a8f938
-
SHA256
016e5cde7156fb49a2c21197a1378af4722004b6c9a78e2511303dbe5dae444f
-
SHA512
4d12706213098c51ef14614145e2745eea848b37aca8a28540248a39490d78eeedbf4d014f689940f91128947c23498f51a64d813f9e416f18c8971ada71d03a
-
SSDEEP
98304:emhd1UryeJRtWzjwe+V7wQqZUha5jtSyR:elpRWjF+2QbaZtlR
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2212 5AC.tmp -
Executes dropped EXE 1 IoCs
pid Process 2212 5AC.tmp -
Loads dropped DLL 2 IoCs
pid Process 1764 80e7081e746ad33c938c726e010ae860_NeikiAnalytics.exe 1764 80e7081e746ad33c938c726e010ae860_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1764 wrote to memory of 2212 1764 80e7081e746ad33c938c726e010ae860_NeikiAnalytics.exe 28 PID 1764 wrote to memory of 2212 1764 80e7081e746ad33c938c726e010ae860_NeikiAnalytics.exe 28 PID 1764 wrote to memory of 2212 1764 80e7081e746ad33c938c726e010ae860_NeikiAnalytics.exe 28 PID 1764 wrote to memory of 2212 1764 80e7081e746ad33c938c726e010ae860_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\80e7081e746ad33c938c726e010ae860_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\80e7081e746ad33c938c726e010ae860_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\5AC.tmp"C:\Users\Admin\AppData\Local\Temp\5AC.tmp" --splashC:\Users\Admin\AppData\Local\Temp\80e7081e746ad33c938c726e010ae860_NeikiAnalytics.exe 4C3B5EE9192F028A6AB387E281BA01CAC16158989F5C398400FFDDE7D0FF393ED18595B41856A0E83D3B73DDAE001F8EE66C0558EC51804ADF0CF8859620175A2⤵
- Deletes itself
- Executes dropped EXE
PID:2212
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.8MB
MD5c7bbe28992eabdf34cfe28a61799567d
SHA1beb23332186bc068b3d9b9f4e92709c33b0a75ee
SHA2565875385d20824eece0ae4acca234a7c2e059982eb3701ab47de70e9f6b79031b
SHA512a1d60a0840051a2d0be96cfcde5e3663806079334507f87225875aac387c291db2a857dbac5b6f85a9698c087c19de04251ea71479e0825e44614733151d0ecc