Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 04:34
Static task
static1
Behavioral task
behavioral1
Sample
79233e52f56c461694a6d2837f6bd8b0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
79233e52f56c461694a6d2837f6bd8b0_NeikiAnalytics.exe
Resource
win10v2004-20240226-en
General
-
Target
79233e52f56c461694a6d2837f6bd8b0_NeikiAnalytics.exe
-
Size
36KB
-
MD5
79233e52f56c461694a6d2837f6bd8b0
-
SHA1
43a57864ba5ca7cb1fa5510ee7ef2773de4cbde0
-
SHA256
c6bdfe7ff7203c742ba1396f8e7f972d65ccdd3e452c40a95d2c57874f353df0
-
SHA512
56e358123145951f5aaac91a9769c9930ce4f8bb2ded6215f982ec356395d7af27fe65d767fdbd1d701b3cea9bde37c72e72d62a21b07ddf69e6bf1074c2b839
-
SSDEEP
384:cKUDthWY/ANpYL3QVvSwBRcDgYCNXGQaI/I51Ee2m3wJp6R3IYsBl3VR9YM:SWTNyMhhvcgNWQBG1Ee/Mg6dT9YM
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2204 bxqyy.exe -
Loads dropped DLL 1 IoCs
pid Process 2424 79233e52f56c461694a6d2837f6bd8b0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2424 wrote to memory of 2204 2424 79233e52f56c461694a6d2837f6bd8b0_NeikiAnalytics.exe 28 PID 2424 wrote to memory of 2204 2424 79233e52f56c461694a6d2837f6bd8b0_NeikiAnalytics.exe 28 PID 2424 wrote to memory of 2204 2424 79233e52f56c461694a6d2837f6bd8b0_NeikiAnalytics.exe 28 PID 2424 wrote to memory of 2204 2424 79233e52f56c461694a6d2837f6bd8b0_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\79233e52f56c461694a6d2837f6bd8b0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\79233e52f56c461694a6d2837f6bd8b0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\bxqyy.exeC:\Users\Admin\AppData\Local\Temp\bxqyy.exe2⤵
- Executes dropped EXE
PID:2204
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD5bb4c02153144d5e2e9ed66e1ca8d562a
SHA199d90cdfd23804acc7c5716c48620b962a64b5df
SHA2566d346c47fc46cd9d8b8eb2accd75f7a8b26cf3915d6740ff4590ee74d32f3b0d
SHA512108d7496e6d95fa27315eb750393e9c162b1ff114b75e13e62884a2cd4defd1fc9f0ad0686f42e555a88f01f33b3281fe549224ac602da45acddb4e1867f89f4