Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14/05/2024, 22:47
Static task
static1
Behavioral task
behavioral1
Sample
3b5aff3b2b4c6b9885c7aa3fd76ae140_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3b5aff3b2b4c6b9885c7aa3fd76ae140_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
3b5aff3b2b4c6b9885c7aa3fd76ae140_NeikiAnalytics.exe
-
Size
65KB
-
MD5
3b5aff3b2b4c6b9885c7aa3fd76ae140
-
SHA1
cc14d437b4b8f501ed541d0776441792d0342311
-
SHA256
13d200cfffb883ab1831a0a2211989448299191de22ea771cd82583770744c17
-
SHA512
134c3936a8563cdb5854fa645749be921656fa3a36329d7fba44cfcf2f278409509e7c32839062c231aef139282d12411ada9f5006dc56b5c1571c94c1ba3310
-
SSDEEP
1536:Lttose4OcUm3QI5EPZo6E5sEFd29NQgA2w6TNle5c:7ose4O+QZo6EKEFdGM29le5c
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 4432 ewiuer2.exe 4656 ewiuer2.exe 4896 ewiuer2.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\ewiuer2.exe ewiuer2.exe File opened for modification C:\Windows\SysWOW64\viesazm.mpk ewiuer2.exe File created C:\Windows\SysWOW64\ewiuer2.exe ewiuer2.exe File opened for modification C:\Windows\SysWOW64\viesazm.mpk ewiuer2.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2364 wrote to memory of 4432 2364 3b5aff3b2b4c6b9885c7aa3fd76ae140_NeikiAnalytics.exe 81 PID 2364 wrote to memory of 4432 2364 3b5aff3b2b4c6b9885c7aa3fd76ae140_NeikiAnalytics.exe 81 PID 2364 wrote to memory of 4432 2364 3b5aff3b2b4c6b9885c7aa3fd76ae140_NeikiAnalytics.exe 81 PID 4432 wrote to memory of 4656 4432 ewiuer2.exe 90 PID 4432 wrote to memory of 4656 4432 ewiuer2.exe 90 PID 4432 wrote to memory of 4656 4432 ewiuer2.exe 90 PID 4656 wrote to memory of 4896 4656 ewiuer2.exe 91 PID 4656 wrote to memory of 4896 4656 ewiuer2.exe 91 PID 4656 wrote to memory of 4896 4656 ewiuer2.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b5aff3b2b4c6b9885c7aa3fd76ae140_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3b5aff3b2b4c6b9885c7aa3fd76ae140_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Roaming\ewiuer2.exeC:\Users\Admin\AppData\Roaming\ewiuer2.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Windows\SysWOW64\ewiuer2.exeC:\Windows\System32\ewiuer2.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\SysWOW64\ewiuer2.exeC:\Windows\SysWOW64\ewiuer2.exe /nomove4⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4896
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5d723c091f27766bf70df3050e88c0d2c
SHA1c9375971c8461bdea03c15e380ed29f05e56fd17
SHA25678acda931c611fd787e1ef8ada9fe90d2a3179ea63ab862716b4d227b9568e6d
SHA512bca59c35c6fefc08df9daedba9c6364e5f51b6c049cbeda8f71591df45740910ffbef55b5de6a7a2bd887e52ae49d349cff9ffccc75e671be1356918590b1707
-
Filesize
65KB
MD542f86b9b7f9e1126e4f541146ee3ecfe
SHA1c35c692a3f923dec3bf773e50663784b02a2028f
SHA256030f76c6115dbf75bd6dc5cb2d7332358e0efefff37fa49a169aa21f65b07f3f
SHA512a2636ac6c1e1df4b3292b7c298f5f60fa4ad4f02d10c6911f0b4013c5de69b045d44c3d6529ebcae60d004a990caccabacf507d563e6583a0b14960d4d04f1db