Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 21:34
Static task
static1
Behavioral task
behavioral1
Sample
3c7d715d43a42c6b09d2c1575ea489e0_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
3c7d715d43a42c6b09d2c1575ea489e0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
3c7d715d43a42c6b09d2c1575ea489e0_NeikiAnalytics.exe
-
Size
95KB
-
MD5
3c7d715d43a42c6b09d2c1575ea489e0
-
SHA1
5f18f523357f4e4cb00af0df2d089d3d5a17d7f9
-
SHA256
4dfc2d98d547aed7a1e68173cf350d27ee73de8711275b0c614d60b69033ffe4
-
SHA512
282adf9a9d22305896d4386894e2a3ca5b3e5988e9fb36fc153846657370482ca56e716e2103fcf069ee53e85337ede6cace77d54200834e69ae9b30f9119b19
-
SSDEEP
1536:9v9jtz+SsPn6wtNoq0dLXJybt00Zp4OFCt/IupVPAokCAjIev3l0bZ3gsckwO:19xYn6wtN0dtymgpd+/lVkflPKbSs
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2420 3c7d715d43a42c6b09d2c1575ea489e0_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 2420 3c7d715d43a42c6b09d2c1575ea489e0_NeikiAnalytics.exe -
Loads dropped DLL 1 IoCs
pid Process 2836 3c7d715d43a42c6b09d2c1575ea489e0_NeikiAnalytics.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2836 3c7d715d43a42c6b09d2c1575ea489e0_NeikiAnalytics.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2836 3c7d715d43a42c6b09d2c1575ea489e0_NeikiAnalytics.exe 2420 3c7d715d43a42c6b09d2c1575ea489e0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2836 wrote to memory of 2420 2836 3c7d715d43a42c6b09d2c1575ea489e0_NeikiAnalytics.exe 29 PID 2836 wrote to memory of 2420 2836 3c7d715d43a42c6b09d2c1575ea489e0_NeikiAnalytics.exe 29 PID 2836 wrote to memory of 2420 2836 3c7d715d43a42c6b09d2c1575ea489e0_NeikiAnalytics.exe 29 PID 2836 wrote to memory of 2420 2836 3c7d715d43a42c6b09d2c1575ea489e0_NeikiAnalytics.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c7d715d43a42c6b09d2c1575ea489e0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\3c7d715d43a42c6b09d2c1575ea489e0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\3c7d715d43a42c6b09d2c1575ea489e0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\3c7d715d43a42c6b09d2c1575ea489e0_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2420
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD59c3ba22d49ad0b1592cb666c967831e1
SHA1e2c29a2c9d66759f7bc24f8b29e679c40b77fcba
SHA256349b3708f972a451bed2071a1a96ce4e47fd919eff3a6d89318239621c7c2c5f
SHA512792f409aa5b864e16cc1da0f37915f973993b2dbb736bbd059862aea757a1ef514b98fbd7394b8e0f0a6a909c6925a1fad5f7d93f6816771bc410ab0683dc0c6