Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    16/05/2024, 21:34

General

  • Target

    3c7d715d43a42c6b09d2c1575ea489e0_NeikiAnalytics.exe

  • Size

    95KB

  • MD5

    3c7d715d43a42c6b09d2c1575ea489e0

  • SHA1

    5f18f523357f4e4cb00af0df2d089d3d5a17d7f9

  • SHA256

    4dfc2d98d547aed7a1e68173cf350d27ee73de8711275b0c614d60b69033ffe4

  • SHA512

    282adf9a9d22305896d4386894e2a3ca5b3e5988e9fb36fc153846657370482ca56e716e2103fcf069ee53e85337ede6cace77d54200834e69ae9b30f9119b19

  • SSDEEP

    1536:9v9jtz+SsPn6wtNoq0dLXJybt00Zp4OFCt/IupVPAokCAjIev3l0bZ3gsckwO:19xYn6wtN0dtymgpd+/lVkflPKbSs

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c7d715d43a42c6b09d2c1575ea489e0_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\3c7d715d43a42c6b09d2c1575ea489e0_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2836
    • C:\Users\Admin\AppData\Local\Temp\3c7d715d43a42c6b09d2c1575ea489e0_NeikiAnalytics.exe
      C:\Users\Admin\AppData\Local\Temp\3c7d715d43a42c6b09d2c1575ea489e0_NeikiAnalytics.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2420

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\3c7d715d43a42c6b09d2c1575ea489e0_NeikiAnalytics.exe

    Filesize

    95KB

    MD5

    9c3ba22d49ad0b1592cb666c967831e1

    SHA1

    e2c29a2c9d66759f7bc24f8b29e679c40b77fcba

    SHA256

    349b3708f972a451bed2071a1a96ce4e47fd919eff3a6d89318239621c7c2c5f

    SHA512

    792f409aa5b864e16cc1da0f37915f973993b2dbb736bbd059862aea757a1ef514b98fbd7394b8e0f0a6a909c6925a1fad5f7d93f6816771bc410ab0683dc0c6

  • memory/2420-17-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2420-23-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2420-28-0x0000000000140000-0x0000000000173000-memory.dmp

    Filesize

    204KB

  • memory/2420-29-0x00000000001B0000-0x00000000001CB000-memory.dmp

    Filesize

    108KB

  • memory/2836-0-0x0000000000400000-0x0000000000433000-memory.dmp

    Filesize

    204KB

  • memory/2836-1-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2836-9-0x0000000000140000-0x0000000000173000-memory.dmp

    Filesize

    204KB

  • memory/2836-15-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB