Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 08:12
Static task
static1
Behavioral task
behavioral1
Sample
c56663e752df4cbeb4c8db32190cea10_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
c56663e752df4cbeb4c8db32190cea10_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
c56663e752df4cbeb4c8db32190cea10_NeikiAnalytics.exe
-
Size
203KB
-
MD5
c56663e752df4cbeb4c8db32190cea10
-
SHA1
5a199bd009e213cbe852a4b86375704b071bbac2
-
SHA256
09843e8a5d08510dd79b7dc3d73b668ab554975478a6e49a615b1535bd2d2ad2
-
SHA512
4f9d68dc2370ea37f2a912bf91e3ac050f6bfc79017f4e85bbdd00014a5c40817bd68397e2eeb8e71f1df25acc498219c48fd81fad87c0c97b0d1ee4f9f0dff1
-
SSDEEP
6144:kIhYqPb0IxS4oByGOSHQhBEPBq9pb/FgyuLRsZ:kmnwFaJdVqg
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2928 c56663e752df4cbeb4c8db32190cea10_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 2928 c56663e752df4cbeb4c8db32190cea10_NeikiAnalytics.exe -
Loads dropped DLL 1 IoCs
pid Process 1616 c56663e752df4cbeb4c8db32190cea10_NeikiAnalytics.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2928 c56663e752df4cbeb4c8db32190cea10_NeikiAnalytics.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1616 c56663e752df4cbeb4c8db32190cea10_NeikiAnalytics.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2928 c56663e752df4cbeb4c8db32190cea10_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1616 wrote to memory of 2928 1616 c56663e752df4cbeb4c8db32190cea10_NeikiAnalytics.exe 28 PID 1616 wrote to memory of 2928 1616 c56663e752df4cbeb4c8db32190cea10_NeikiAnalytics.exe 28 PID 1616 wrote to memory of 2928 1616 c56663e752df4cbeb4c8db32190cea10_NeikiAnalytics.exe 28 PID 1616 wrote to memory of 2928 1616 c56663e752df4cbeb4c8db32190cea10_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c56663e752df4cbeb4c8db32190cea10_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\c56663e752df4cbeb4c8db32190cea10_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\c56663e752df4cbeb4c8db32190cea10_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\c56663e752df4cbeb4c8db32190cea10_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
PID:2928
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
203KB
MD5953a42c6ab18bb30ff56a7366a5db6c6
SHA12c980b3387bc16c8b5933bb6a7511ad324d3a687
SHA25612ebf5a91498498bbed7384b63b204ead2987ad1f279fc126c7df5c5c93d14af
SHA512866eb4cfea1b2dc2beeb9662b06b1c9c8a4ca60c1f89135aee8099d74c645885a5760ae495356f4964599c3fb0d232512a0ba21651b9f8427fb8226f442dad77