Analysis
-
max time kernel
134s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2024, 21:02
Static task
static1
Behavioral task
behavioral1
Sample
34599eb6d188fe3d0c573bf9f1850750_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
34599eb6d188fe3d0c573bf9f1850750_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
34599eb6d188fe3d0c573bf9f1850750_NeikiAnalytics.exe
-
Size
969KB
-
MD5
34599eb6d188fe3d0c573bf9f1850750
-
SHA1
1510281181378f6a5618aecf01e5f0ac82d574bb
-
SHA256
32aef13fea77f78375b5ff11b7bd52cebb7a16fc62274b52964c145fc373f130
-
SHA512
f547f19aa8f28ff108cd5b749d25b5e42d8a0fda8dce8b32212bafd2d140f96e35d2cda61c0e099fa58aa2d399ad192fba0b8d5e046bb7dab090c30c5b77f9f5
-
SSDEEP
24576:w+sLLV06xhHC+Uq/V9DrhEEa/ZSsD0TCIOhPe6BWqLp:inVpxhi+V9XOEg3D0GIOhPe6BWep
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2000 34599eb6d188fe3d0c573bf9f1850750_NeikiAnalytics.exe -
Executes dropped EXE 1 IoCs
pid Process 2000 34599eb6d188fe3d0c573bf9f1850750_NeikiAnalytics.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 16 pastebin.com 17 pastebin.com -
Program crash 15 IoCs
pid pid_target Process procid_target 2444 4820 WerFault.exe 82 4872 2000 WerFault.exe 89 5036 2000 WerFault.exe 89 4176 2000 WerFault.exe 89 4940 2000 WerFault.exe 89 3280 2000 WerFault.exe 89 2912 2000 WerFault.exe 89 4136 2000 WerFault.exe 89 1748 2000 WerFault.exe 89 5028 2000 WerFault.exe 89 1460 2000 WerFault.exe 89 524 2000 WerFault.exe 89 972 2000 WerFault.exe 89 4216 2000 WerFault.exe 89 1660 2000 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2000 34599eb6d188fe3d0c573bf9f1850750_NeikiAnalytics.exe 2000 34599eb6d188fe3d0c573bf9f1850750_NeikiAnalytics.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4820 34599eb6d188fe3d0c573bf9f1850750_NeikiAnalytics.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2000 34599eb6d188fe3d0c573bf9f1850750_NeikiAnalytics.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4820 wrote to memory of 2000 4820 34599eb6d188fe3d0c573bf9f1850750_NeikiAnalytics.exe 89 PID 4820 wrote to memory of 2000 4820 34599eb6d188fe3d0c573bf9f1850750_NeikiAnalytics.exe 89 PID 4820 wrote to memory of 2000 4820 34599eb6d188fe3d0c573bf9f1850750_NeikiAnalytics.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\34599eb6d188fe3d0c573bf9f1850750_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\34599eb6d188fe3d0c573bf9f1850750_NeikiAnalytics.exe"1⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4820 -s 3122⤵
- Program crash
PID:2444
-
-
C:\Users\Admin\AppData\Local\Temp\34599eb6d188fe3d0c573bf9f1850750_NeikiAnalytics.exeC:\Users\Admin\AppData\Local\Temp\34599eb6d188fe3d0c573bf9f1850750_NeikiAnalytics.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:2000 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 3443⤵
- Program crash
PID:4872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 6283⤵
- Program crash
PID:5036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 6363⤵
- Program crash
PID:4176
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 6363⤵
- Program crash
PID:4940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 6923⤵
- Program crash
PID:3280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 9643⤵
- Program crash
PID:2912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 14003⤵
- Program crash
PID:4136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 15003⤵
- Program crash
PID:1748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 15123⤵
- Program crash
PID:5028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 16523⤵
- Program crash
PID:1460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 15283⤵
- Program crash
PID:524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 15003⤵
- Program crash
PID:972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 14003⤵
- Program crash
PID:4216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 6523⤵
- Program crash
PID:1660
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4820 -ip 48201⤵PID:2112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2000 -ip 20001⤵PID:2008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2000 -ip 20001⤵PID:648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2000 -ip 20001⤵PID:2916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2000 -ip 20001⤵PID:1060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2000 -ip 20001⤵PID:392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2000 -ip 20001⤵PID:1768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2000 -ip 20001⤵PID:944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 2000 -ip 20001⤵PID:4076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2000 -ip 20001⤵PID:4220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2000 -ip 20001⤵PID:4168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2000 -ip 20001⤵PID:1936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2000 -ip 20001⤵PID:2268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2000 -ip 20001⤵PID:3904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2000 -ip 20001⤵PID:3032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
969KB
MD549b15364b3ed3bf1ccb16143fd4d99b9
SHA12263bc7186a4318b86f11e00c13baca83ef2761a
SHA256fe57169136a73a77c086971814e61d63802d9f09c1769f6686f3bc2d51116579
SHA512221ac99509c2fabdb08d3bf5391b5f25bd270fb00801d6f8398bb24250ba4f81813c586a283998442de4c75b8e7084967fc6e39d5bb47d524b20c45cc676f1bf