Analysis
-
max time kernel
89s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-05-2024 05:00
Behavioral task
behavioral1
Sample
9f367f475bd6bed5bc886e6d578d5130_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9f367f475bd6bed5bc886e6d578d5130_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
9f367f475bd6bed5bc886e6d578d5130_NeikiAnalytics.exe
-
Size
72KB
-
MD5
9f367f475bd6bed5bc886e6d578d5130
-
SHA1
3dd5c8c54019b93368f19cce69d04a3e51910a01
-
SHA256
fe97fe4468d5eefa6f5b3df6a6ec4d9d3949b1929a4855801b071f8e3f0519ee
-
SHA512
1faccc1d663e1eadb8427099cbaeafd7fde29c9f730aa635a336a229f97446aaa4a9330a947786b16cf8f3f482b065c0052600b353b5ef7315a44b5fcd77a899
-
SSDEEP
1536:DOa2kZ+qcAGVRIcUjmTeyovQe1RLP0sLJtoz9ZDu7GOXTm:DOYZTBORVUjtvR1L96BSXK
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2960-1-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2960-95-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2960-360397-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2960-445518-0x0000000002720000-0x0000000002742000-memory.dmp upx behavioral1/memory/143428-445528-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2960-445531-0x0000000000400000-0x0000000000422000-memory.dmp upx \Users\Admin\AppData\Roaming\..Flash\Flaseher.exe upx behavioral1/memory/143428-445558-0x0000000002520000-0x0000000002542000-memory.dmp upx behavioral1/memory/62820-445576-0x0000000000400000-0x0000000000422000-memory.dmp upx -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
9f367f475bd6bed5bc886e6d578d5130_NeikiAnalytics.exepid process 2960 9f367f475bd6bed5bc886e6d578d5130_NeikiAnalytics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f367f475bd6bed5bc886e6d578d5130_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\9f367f475bd6bed5bc886e6d578d5130_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\9f367f475bd6bed5bc886e6d578d5130_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\9f367f475bd6bed5bc886e6d578d5130_NeikiAnalytics.exe"2⤵PID:143428
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\XUIUF.bat" "3⤵PID:110572
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v ".Flasfh" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\..Flash\Flaseher.exe" /f4⤵PID:30732
-
-
-
C:\Users\Admin\AppData\Roaming\..Flash\Flaseher.exe"C:\Users\Admin\AppData\Roaming\..Flash\Flaseher.exe"3⤵PID:62820
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
145B
MD5da0cbe87b720a79b294147ed6a4b98be
SHA1ebf0dc9efd7a12cb192e355cda87546acb4ab360
SHA2567ccfeff356fdccc9145bd1e263aa1c56360ca7b6552ed5a5665c596d02a627ed
SHA512f55c4a3d24d2f11db5eda3c816d1cd3b8804a171a7bf715b13d60788247fbb352eafaa5bd4e0a8086c1013396be0a48c7bdb904ab0f974fa0c75e81e3d365acc
-
Filesize
72KB
MD5aa4430fcbd818635b71870288f7901e7
SHA11324a602deba4ab8a22eadd882b4da88f48e84fd
SHA256fda52020a5e1ab38d5937fd4f6b40b80e88ea1ed596f19be54636c7b8ee854aa
SHA51256523fcc290a9c7ed37bb0fd6f5b6f2b5dd94e9b27980ce4d0423b63be0af0f1cb41ee9a81e6bd50319d646c0476025dc69e32d9330bddf2f577d3b524706d75