Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    12/05/2024, 08:03

General

  • Target

    80e7081e746ad33c938c726e010ae860_NeikiAnalytics.exe

  • Size

    4.8MB

  • MD5

    80e7081e746ad33c938c726e010ae860

  • SHA1

    c0fda642d8a6ba129ee0a6c01a239a5bf1a8f938

  • SHA256

    016e5cde7156fb49a2c21197a1378af4722004b6c9a78e2511303dbe5dae444f

  • SHA512

    4d12706213098c51ef14614145e2745eea848b37aca8a28540248a39490d78eeedbf4d014f689940f91128947c23498f51a64d813f9e416f18c8971ada71d03a

  • SSDEEP

    98304:emhd1UryeJRtWzjwe+V7wQqZUha5jtSyR:elpRWjF+2QbaZtlR

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\80e7081e746ad33c938c726e010ae860_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\80e7081e746ad33c938c726e010ae860_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1764
    • C:\Users\Admin\AppData\Local\Temp\5AC.tmp
      "C:\Users\Admin\AppData\Local\Temp\5AC.tmp" --splashC:\Users\Admin\AppData\Local\Temp\80e7081e746ad33c938c726e010ae860_NeikiAnalytics.exe 4C3B5EE9192F028A6AB387E281BA01CAC16158989F5C398400FFDDE7D0FF393ED18595B41856A0E83D3B73DDAE001F8EE66C0558EC51804ADF0CF8859620175A
      2⤵
      • Deletes itself
      • Executes dropped EXE
      PID:2212

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\5AC.tmp

    Filesize

    4.8MB

    MD5

    c7bbe28992eabdf34cfe28a61799567d

    SHA1

    beb23332186bc068b3d9b9f4e92709c33b0a75ee

    SHA256

    5875385d20824eece0ae4acca234a7c2e059982eb3701ab47de70e9f6b79031b

    SHA512

    a1d60a0840051a2d0be96cfcde5e3663806079334507f87225875aac387c291db2a857dbac5b6f85a9698c087c19de04251ea71479e0825e44614733151d0ecc

  • memory/1764-0-0x0000000000400000-0x0000000000849000-memory.dmp

    Filesize

    4.3MB

  • memory/2212-9-0x0000000000400000-0x0000000000849000-memory.dmp

    Filesize

    4.3MB