Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
16-05-2024 19:00
Static task
static1
Behavioral task
behavioral1
Sample
165787fb4d229ea6e0f82590e48c77b0_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
165787fb4d229ea6e0f82590e48c77b0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
165787fb4d229ea6e0f82590e48c77b0_NeikiAnalytics.exe
-
Size
203KB
-
MD5
165787fb4d229ea6e0f82590e48c77b0
-
SHA1
8ad128e893bd82b36c5df9644645e39e5ec27e27
-
SHA256
31774443c56fb79367a50b25b822e0426e90ddd2143f272b156bd173c11429b4
-
SHA512
fe353b25e1fb6b79343c0fc16c936a734f40cbd0b340b99091181e88164cbaa67f533e62d77bf6b943e1079fe033dc5094daab726e18535d21f7d6e1a9762cb1
-
SSDEEP
3072:nA9pKbOfsyzImo0wYz0Un/yfBNe/ZHl52qqNoXf6+1hyeYs/4lEJGMsget:nupKaEyzIR0wYravE5ZqNay+1pYsvsZ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2284 165787fb4d229ea6e0f82590e48c77b0_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 2284 165787fb4d229ea6e0f82590e48c77b0_NeikiAnalytics.exe -
Loads dropped DLL 1 IoCs
pid Process 2792 165787fb4d229ea6e0f82590e48c77b0_NeikiAnalytics.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2284 165787fb4d229ea6e0f82590e48c77b0_NeikiAnalytics.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2792 165787fb4d229ea6e0f82590e48c77b0_NeikiAnalytics.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2284 165787fb4d229ea6e0f82590e48c77b0_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2284 2792 165787fb4d229ea6e0f82590e48c77b0_NeikiAnalytics.exe 28 PID 2792 wrote to memory of 2284 2792 165787fb4d229ea6e0f82590e48c77b0_NeikiAnalytics.exe 28 PID 2792 wrote to memory of 2284 2792 165787fb4d229ea6e0f82590e48c77b0_NeikiAnalytics.exe 28 PID 2792 wrote to memory of 2284 2792 165787fb4d229ea6e0f82590e48c77b0_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\165787fb4d229ea6e0f82590e48c77b0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\165787fb4d229ea6e0f82590e48c77b0_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\165787fb4d229ea6e0f82590e48c77b0_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\165787fb4d229ea6e0f82590e48c77b0_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
PID:2284
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
203KB
MD554920089bb0d5ee7c216f8438c5412a1
SHA1ec5b10b9390ba169a248cd7e6a47d00f04e40ee3
SHA25672aacb3bd17d83cb4161efb29b6dfe60351347f0799bfded5a9f05db66ad1f61
SHA51221e5a83ce87468f71269712fba44c6b646f3ba8e5054e4fd783da0d9e4d8e9dfb23968c98d1e69e09202f80130295ea37f9cc0af03eaaf52dc20b160594fe8ee