Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 20:16
Static task
static1
Behavioral task
behavioral1
Sample
287e1064912ee1ca343a179a7bd5b960_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
287e1064912ee1ca343a179a7bd5b960_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
287e1064912ee1ca343a179a7bd5b960_NeikiAnalytics.exe
-
Size
384KB
-
MD5
287e1064912ee1ca343a179a7bd5b960
-
SHA1
f5f98b48e385c22b855147337516c1ddbd362640
-
SHA256
f521159f6cd7432e9bc7ab26d4c3841ce7761bb68cc994f1739495f92e75164b
-
SHA512
81ca67e8c25d86633848624d3974a53811fb6cc94f4af72ec934eab6ab02036b1dc4682e322c718247619d7d9c176964cfb72b01b857cebef464d868a39dacec
-
SSDEEP
6144:e7GZIeS9w3t7UmxdpQD3F3AdBxSZWdDJboY4sJ9pALL7j11:qMIeS47UmxTQTF3AdBQZ6D9d9pAX
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2928 287e1064912ee1ca343a179a7bd5b960_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 2928 287e1064912ee1ca343a179a7bd5b960_NeikiAnalytics.exe -
Loads dropped DLL 1 IoCs
pid Process 1660 287e1064912ee1ca343a179a7bd5b960_NeikiAnalytics.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2928 287e1064912ee1ca343a179a7bd5b960_NeikiAnalytics.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1660 287e1064912ee1ca343a179a7bd5b960_NeikiAnalytics.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2928 287e1064912ee1ca343a179a7bd5b960_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1660 wrote to memory of 2928 1660 287e1064912ee1ca343a179a7bd5b960_NeikiAnalytics.exe 28 PID 1660 wrote to memory of 2928 1660 287e1064912ee1ca343a179a7bd5b960_NeikiAnalytics.exe 28 PID 1660 wrote to memory of 2928 1660 287e1064912ee1ca343a179a7bd5b960_NeikiAnalytics.exe 28 PID 1660 wrote to memory of 2928 1660 287e1064912ee1ca343a179a7bd5b960_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\287e1064912ee1ca343a179a7bd5b960_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\287e1064912ee1ca343a179a7bd5b960_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\287e1064912ee1ca343a179a7bd5b960_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\287e1064912ee1ca343a179a7bd5b960_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
PID:2928
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD5b933dceb08730870556d24eeed2b0ca8
SHA1d88b2c0e0657a13834e9641d7afcb9d759e82db7
SHA256c954af7dda23b3f42d845122bca01b12f3a5610576d7edde9a8a77757d19ed81
SHA512c9531740fc53a10c62537affedbf225c85a8dd14c219798fd38be2e86a44d85027d350061df9f1830afa60f5d3361f77d0dca60555d07fdc67149e1d87d1e545