Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    16/05/2024, 02:16

General

  • Target

    7dae877e96f7dceb8894cb5d20be3280_NeikiAnalytics.exe

  • Size

    704KB

  • MD5

    7dae877e96f7dceb8894cb5d20be3280

  • SHA1

    a1a8ba92cd2209fe7bde49d6fac062b4db83e5f7

  • SHA256

    905d00581eee8e5167fd4b6cb54c6fa5f66978e03ae0ceda0003bf34fa8e510a

  • SHA512

    90efcb8d9729d123d0872062f9ca3141bfb5e816a97864967472c6d827998d73a7afd35bf37e1916c6b84d5aa4f5afb453e1ad56c9a8f577b74633194eefc4e5

  • SSDEEP

    12288:p4uFR+66uZBX9aLisvNeOVQ5zCD4TyWN9VysX7rdGrr5MSEJRrv1:a4P6ubX9aLisvNeOVQ5zY4xN9VyUGEJz

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7dae877e96f7dceb8894cb5d20be3280_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\7dae877e96f7dceb8894cb5d20be3280_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:3048
    • C:\Users\Admin\AppData\Local\Temp\7dae877e96f7dceb8894cb5d20be3280_NeikiAnalytics.exe
      C:\Users\Admin\AppData\Local\Temp\7dae877e96f7dceb8894cb5d20be3280_NeikiAnalytics.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:2604

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\7dae877e96f7dceb8894cb5d20be3280_NeikiAnalytics.exe

          Filesize

          704KB

          MD5

          3d3904cc19a612604513d5432f97bc52

          SHA1

          bbef212ab63c4042b2e28c56c480b7194ee4f120

          SHA256

          917aa4b47f16dd6500d8732d8d7aa94a2f3318d404e83bceb8e3051dc8328e70

          SHA512

          93a6435c975ba5eb4c34df4be2eaf022f8384edd70127e07ddd5938fbfc17062d399be7b5a0e83f9d79d785372dd0816362cddcbb05bb23b1e4260bee1242ed2

        • memory/2604-11-0x0000000000400000-0x0000000000442000-memory.dmp

          Filesize

          264KB

        • memory/2604-12-0x0000000000400000-0x000000000041A000-memory.dmp

          Filesize

          104KB

        • memory/2604-17-0x0000000000130000-0x0000000000172000-memory.dmp

          Filesize

          264KB

        • memory/3048-0-0x0000000000400000-0x0000000000442000-memory.dmp

          Filesize

          264KB

        • memory/3048-6-0x0000000000130000-0x0000000000172000-memory.dmp

          Filesize

          264KB

        • memory/3048-10-0x0000000000400000-0x0000000000442000-memory.dmp

          Filesize

          264KB