Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    16/05/2024, 20:16

General

  • Target

    287e1064912ee1ca343a179a7bd5b960_NeikiAnalytics.exe

  • Size

    384KB

  • MD5

    287e1064912ee1ca343a179a7bd5b960

  • SHA1

    f5f98b48e385c22b855147337516c1ddbd362640

  • SHA256

    f521159f6cd7432e9bc7ab26d4c3841ce7761bb68cc994f1739495f92e75164b

  • SHA512

    81ca67e8c25d86633848624d3974a53811fb6cc94f4af72ec934eab6ab02036b1dc4682e322c718247619d7d9c176964cfb72b01b857cebef464d868a39dacec

  • SSDEEP

    6144:e7GZIeS9w3t7UmxdpQD3F3AdBxSZWdDJboY4sJ9pALL7j11:qMIeS47UmxTQTF3AdBQZ6D9d9pAX

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\287e1064912ee1ca343a179a7bd5b960_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\287e1064912ee1ca343a179a7bd5b960_NeikiAnalytics.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:1660
    • C:\Users\Admin\AppData\Local\Temp\287e1064912ee1ca343a179a7bd5b960_NeikiAnalytics.exe
      C:\Users\Admin\AppData\Local\Temp\287e1064912ee1ca343a179a7bd5b960_NeikiAnalytics.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of UnmapMainImage
      PID:2928

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\287e1064912ee1ca343a179a7bd5b960_NeikiAnalytics.exe

          Filesize

          384KB

          MD5

          b933dceb08730870556d24eeed2b0ca8

          SHA1

          d88b2c0e0657a13834e9641d7afcb9d759e82db7

          SHA256

          c954af7dda23b3f42d845122bca01b12f3a5610576d7edde9a8a77757d19ed81

          SHA512

          c9531740fc53a10c62537affedbf225c85a8dd14c219798fd38be2e86a44d85027d350061df9f1830afa60f5d3361f77d0dca60555d07fdc67149e1d87d1e545

        • memory/1660-0-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/1660-6-0x00000000001B0000-0x00000000001E6000-memory.dmp

          Filesize

          216KB

        • memory/1660-10-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/2928-11-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/2928-12-0x0000000000400000-0x0000000000415000-memory.dmp

          Filesize

          84KB

        • memory/2928-17-0x0000000000130000-0x0000000000166000-memory.dmp

          Filesize

          216KB