Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
17-05-2024 07:03
Behavioral task
behavioral1
Sample
c931a27d111f32674105713fdc964120_NeikiAnalytics.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
c931a27d111f32674105713fdc964120_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
c931a27d111f32674105713fdc964120_NeikiAnalytics.exe
-
Size
19KB
-
MD5
c931a27d111f32674105713fdc964120
-
SHA1
2a280220c4a624e082a6131ef0baf470e737dc7c
-
SHA256
22ee1bc310f8cca02975f01dcec46be2d779ebedf96e1732c34ec46c8a6216da
-
SHA512
0cfbb967f3fdb6fae36d640ad955b5bf0e5a3b0b1b1c0683a5ebb49ea9f98221dbe0f8f5c7327c6f6a6a8e929396eb42fb265f3b5bee5c07a77db650abb641df
-
SSDEEP
384:ZKRHBDj1y6sX7d/ZctaQTKfV1T6CSB8Oye3QBYLO0:URHBfCX7PcAD6CC8Oye3QaS0
Malware Config
Signatures
-
Upatre
Upatre is a generic malware downloader.
-
Executes dropped EXE 1 IoCs
pid Process 768 szgfw.exe -
Loads dropped DLL 2 IoCs
pid Process 2924 c931a27d111f32674105713fdc964120_NeikiAnalytics.exe 2924 c931a27d111f32674105713fdc964120_NeikiAnalytics.exe -
resource yara_rule behavioral1/memory/2924-1-0x0000000000400000-0x0000000000407000-memory.dmp upx behavioral1/files/0x000b0000000160cc-3.dat upx -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2924 wrote to memory of 768 2924 c931a27d111f32674105713fdc964120_NeikiAnalytics.exe 28 PID 2924 wrote to memory of 768 2924 c931a27d111f32674105713fdc964120_NeikiAnalytics.exe 28 PID 2924 wrote to memory of 768 2924 c931a27d111f32674105713fdc964120_NeikiAnalytics.exe 28 PID 2924 wrote to memory of 768 2924 c931a27d111f32674105713fdc964120_NeikiAnalytics.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c931a27d111f32674105713fdc964120_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\c931a27d111f32674105713fdc964120_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\szgfw.exe"C:\Users\Admin\AppData\Local\Temp\szgfw.exe"2⤵
- Executes dropped EXE
PID:768
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD5144d90b48a3b53647bace55c98eff919
SHA18606fa1573d2f34538bf3171c04e99917bc831a1
SHA2569239faba35de4245dbc4ac90c36ddc9c6948a47aa2c624adee03e9d88a0213a4
SHA5126965977150af8db1b3ed3b588c63eec7da5f47bd5885018f2beffb10b3f5f894e10cbabc48a584c59c4ad6cfbec5db8615da3ceb4540bafc2471d34554742dfc