Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15/05/2024, 04:19

General

  • Target

    7ac2e3e69357b9494f016871f74bc190_NeikiAnalytics.exe

  • Size

    126KB

  • MD5

    7ac2e3e69357b9494f016871f74bc190

  • SHA1

    41aabf11dd30bfc8877ad70f583fdc7e443c92e5

  • SHA256

    db671a1ca32d2ab50f3f9efd45aea4bde307d1c908c240d8c4f662971b92bf79

  • SHA512

    62ae68751f38eb37ace54605c92952800f64d94d2754706551ef0801b68b046e0848fb5ea2efe63af1323fcf1bc37c0b521e8796eeb2e52228f662171db699e3

  • SSDEEP

    3072:vTE58q4+HrCpQctB71WbFi4MkZy8l/Tb04/Md+SHiY16N:o1i4hlE5

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7ac2e3e69357b9494f016871f74bc190_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\7ac2e3e69357b9494f016871f74bc190_NeikiAnalytics.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2904
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 2904 -s 604
      2⤵
        PID:2680

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2904-0-0x000007FEF5573000-0x000007FEF5574000-memory.dmp

      Filesize

      4KB

    • memory/2904-1-0x0000000001250000-0x0000000001278000-memory.dmp

      Filesize

      160KB

    • memory/2904-2-0x000007FEF5570000-0x000007FEF5F5C000-memory.dmp

      Filesize

      9.9MB

    • memory/2904-3-0x000007FEF5573000-0x000007FEF5574000-memory.dmp

      Filesize

      4KB